102 results on '"Kang, Jiawen"'
Search Results
2. Partially shared federated multiview learning
- Author
-
Li, Daoyuan, Yang, Zuyuan, Kang, Jiawen, He, Minfan, and Xie, Shengli
- Published
- 2024
- Full Text
- View/download PDF
3. Lightweight adaptive Byzantine fault tolerant consensus algorithm for distributed energy trading
- Author
-
Ye, Jin, Hu, Huilin, Liang, Jiahua, Yin, Linfei, and Kang, Jiawen
- Published
- 2024
- Full Text
- View/download PDF
4. An adaptive asynchronous federated learning framework for heterogeneous Internet of things
- Author
-
Zhang, Weidong, Deng, Dongshang, Wu, Xuangou, Zhao, Wei, Liu, Zhi, Zhang, Tao, Kang, Jiawen, and Niyato, Dusit
- Published
- 2025
- Full Text
- View/download PDF
5. Stable carbon isotopic composition of particulate organic matter in the Cosmonaut and Cooperation Seas in summer
- Author
-
Kang, Jiawen, Hao, Qiang, Cao, Shunan, Zhao, Jun, Yang, Zifei, Tang, Zhen, Zheng, Minfang, Qiu, Yusheng, Chen, Mengya, Pan, Jianming, He, Jianfeng, and Chen, Min
- Published
- 2024
- Full Text
- View/download PDF
6. Privacy computing meets metaverse: Necessity, taxonomy and challenges
- Author
-
Chen, Chuan, Li, Yuecheng, Wu, Zhenpeng, Mai, Chengyuan, Liu, Youming, Hu, Yanming, Kang, Jiawen, and Zheng, Zibin
- Published
- 2024
- Full Text
- View/download PDF
7. Valley-positioning-assisted discrete cross-correlation algorithm for fast cavity length interrogation of fiber-optic Fabry–Perot sensors
- Author
-
Kang, Jiawen, Chen, Haibin, Zhang, Xiongxing, Zhang, Junying, Guo, Zilong, and Wang, Wei
- Published
- 2022
- Full Text
- View/download PDF
8. Conjugate gradient persymmetric adaptive matched filter
- Author
-
Lin, Jie, Jiang, Chaoshu, Jiang, Jiahua, and Kang, Jiawen
- Published
- 2022
- Full Text
- View/download PDF
9. Artificial Intelligence for Web 3.0: A Comprehensive Survey.
- Author
-
Shen, Meng, Tan, Zhehui, Niyato, Dusit, Liu, Yuzhi, Kang, Jiawen, Xiong, Zehui, Zhu, Liehuang, Wang, Wei, and Shen, Xuemin
- Published
- 2024
- Full Text
- View/download PDF
10. CN-Celeb: Multi-genre speaker recognition
- Author
-
Li, Lantian, Liu, Ruiqi, Kang, Jiawen, Fan, Yue, Cui, Hao, Cai, Yunqi, Vipperla, Ravichander, Zheng, Thomas Fang, and Wang, Dong
- Published
- 2022
- Full Text
- View/download PDF
11. Joint optimization of service chain caching and task offloading in mobile edge computing
- Author
-
Peng, Kai, Nie, Jiangtian, Kumar, Neeraj, Cai, Chao, Kang, Jiawen, Xiong, Zehui, and Zhang, Yang
- Published
- 2021
- Full Text
- View/download PDF
12. Unleashing the Power of Edge-Cloud Generative AI in Mobile Networks: A Survey of AIGC Services.
- Author
-
Xu, Minrui, Du, Hongyang, Niyato, Dusit, Kang, Jiawen, Xiong, Zehui, Mao, Shiwen, Han, Zhu, Jamalipour, Abbas, Kim, Dong In, Shen, Xuemin, Leung, Victor C. M., and Poor, H. Vincent
- Published
- 2024
- Full Text
- View/download PDF
13. DFMG decreases angiogenesis to uphold plaque stability by inhibiting the TLR4/VEGF pathway in mice.
- Author
-
Bai, Pingjuan, Xiang, Xueping, Kang, Jiawen, Xiang, Xiaoqing, Jiang, Jingwen, Fu, Xiaohua, Zhang, Yong, and Li, Lesai
- Subjects
NEOVASCULARIZATION ,CHORIOALLANTOIS ,KNOCKOUT mice ,THORACIC aorta ,ATHEROSCLEROTIC plaque ,CHICKEN embryos - Abstract
The aim of this study was to elucidate the specific mechanism through which 7-difluoromethoxy-5,4'-dimethoxygenistein (DFMG) inhibits angiogenesis in atherosclerosis (AS) plaques, given its previously observed but poorly understood inhibitory effects. In vitro, a model using Human Umbilical Vein Endothelial (HUVEC-12) cells simulated the initial lesion in the atherosclerotic pathological process, specifically oxidative stress injury, by exposing cells to 30 μmol/L LPC. Additionally, an AS mouse model was developed in ApoE knockout mice through a 16-week period of high-fat feeding. DFMG demonstrated a reduction in tubule quantities in the tube formation assay and neovascularization induced by oxidative stress-damaged endothelial cells in the chicken embryo chorioallantoic membrane assay. Furthermore, DFMG decreased lipid levels in the blood of ApoE knockout mice with AS, along with a decrease in atherosclerotic plaques and neovascularizations in the aortic arch and descending aorta of AS animal models. DFMG treatment upregulated microRNA140 (miR-140) expression and suppressed VEGF secretion in HUVEC-12 cells. These effects were counteracted by Toll-like receptor 4 (TLR4) overexpression in HUVEC-12 cells subjected to oxidative injury or in a mouse model of AS. Dual-luciferase reporter assays demonstrated that miR-140 directly targeted TLR4. Immunohistochemical assay findings indicated a significant inverse relationship between miR-140 expression and TLR4 expression in ApoE knockout mice subjected to a high-fat diet. The study observed a close association between DFMG inhibitory effects on angiogenesis and plaque stability in AS, and the inhibition of the TLR4/NF-κB/VEGF signaling pathway, negatively regulated by miR-140. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. Survey on the scheme evaluation, opportunities and challenges of software defined‐information centric network.
- Author
-
Ai, Zhengyang, Zhang, Ming, Zhang, Weiting, Kang, Jiawen, Tong, Lingling, and Duan, Yunqiang
- Subjects
SOFTWARE-defined networking ,ARTIFICIAL intelligence ,NEXT generation networks ,COMPUTER software ,WIDE area networks ,COMPUTER networks - Abstract
As a promising architecture of next‐generation network, software defined‐information centric network (SD‐ICN) inherits the advantages of software defined network (SDN) and information‐centric network (ICN) to enable flexible and fast content retrieval, especially in the current era of artificial intelligence. However, the existing researches mainly focus on a single respective in this field, which motivates in comprehensively providing a forward‐looking guidance and development direction for scholars and engineers. To this end, the latest developments of SD‐ICN is presented. First, the widely‐accepted concepts and impacts on traditional networks are introduced. Second, the shortcomings of SDN and ICN over conventional networks are respectively analyzed to illustrate the necessity of SD‐ICN. Third, based on extensive analysis and deep deliberation, a methodical taxonomy for existing combination studies is proposed. They are divided into SDN over ICN, ICN over SDN, and mutual immersive pattern. Fourth, the performances of three integration categories are compared and the limitations of related works are highlighted. Fifth, the maturity index from six development indicators are evaluated. Further, the maturity and practicality of these schemes are generalized. Based on the above studies and comparisons, the lessons learned by SDN and ICN developments are concluded. Finally, future research directions and opportunities are discussed for the readers. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
15. Sparks of Generative Pretrained Transformers in Edge Intelligence for the Metaverse: Caching and Inference for Mobile Artificial Intelligence-Generated Content Services.
- Author
-
Xu, Minrui, Niyato, Dusit, Zhang, Hongliang, Kang, Jiawen, Xiong, Zehui, Mao, Shiwen, and Han, Zhu
- Abstract
Aiming at achieving artificial general intelligence (AGI) for the metaverse, pretrained foundation models (PFMs), e.g., generative pretrained transformers (GPTs), can effectively provide various artificial intelligence (AI) services, such as autonomous driving, digital twins (DTs), and AI-generated content (AIGC) for extended reality (XR). With the advantages of low latency and privacy-preserving, serving PFMs of mobile AI services in edge intelligence is a viable solution for caching and executing PFMs on edge servers with limited computing resources and GPU memory. However, PFMs typically consist of billions of parameters that are computation- and memory-intensive for edge servers during loading and execution. In this article, we investigate edge PFM serving problems for mobile AIGC services of the metaverse. First, we introduce the fundamentals of PFMs and discuss their characteristic fine-tuning and inference methods in edge intelligence. Then, we propose a novel framework of joint model caching and inference for managing models and allocating resources to satisfy users’ requests efficiently. Furthermore, considering the in-context learning ability of PFMs, we propose a new metric to evaluate the freshness and relevance between examples in demonstrations and executing tasks, namely the Age of Context (AoC). Finally, we propose a least-context (LC) algorithm for managing cached models at edge servers by balancing the tradeoff among latency, energy consumption, and accuracy. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
16. Blockchain‐assisted twin migration for vehicular metaverses: A game theory approach.
- Author
-
Zhong, Yue, Wen, Jinbo, Zhang, Junhong, Kang, Jiawen, Jiang, Yuna, Zhang, Yang, Cheng, Yanyu, and Tong, Yongju
- Published
- 2023
- Full Text
- View/download PDF
17. A Revolution of Personalized Healthcare: Enabling Human Digital Twin with Mobile AIGC
- Author
-
Chen, Jiayuan, Yi, Changyan, Du, Hongyang, Niyato, Dusit, Kang, Jiawen, Cai, Jun, Xuemin, and Shen
- Subjects
Computer Science - Networking and Internet Architecture ,Computer Science - Machine Learning ,Computer Science - Artificial Intelligence - Abstract
Mobile Artificial Intelligence-Generated Content (AIGC) technology refers to the adoption of AI algorithms deployed at mobile edge networks to automate the information creation process while fulfilling the requirements of end users. Mobile AIGC has recently attracted phenomenal attentions and can be a key enabling technology for an emerging application, called human digital twin (HDT). HDT empowered by the mobile AIGC is expected to revolutionize the personalized healthcare by generating rare disease data, modeling high-fidelity digital twin, building versatile testbeds, and providing 24/7 customized medical services. To promote the development of this new breed of paradigm, in this article, we propose a system architecture of mobile AIGC-driven HDT and highlight the corresponding design requirements and challenges. Moreover, we illustrate two use cases, i.e., mobile AIGC-driven HDT in customized surgery planning and personalized medication. In addition, we conduct an experimental study to prove the effectiveness of the proposed mobile AIGC-driven HDT solution, which shows a particular application in a virtual physical therapy teaching platform. Finally, we conclude this article by briefly discussing several open issues and future directions.
- Published
- 2023
18. Federated Learning-Empowered AI-Generated Content in Wireless Networks
- Author
-
Huang, Xumin, Li, Peichun, Du, Hongyang, Kang, Jiawen, Niyato, Dusit, Kim, Dong In, and Wu, Yuan
- Subjects
FOS: Computer and information sciences ,Artificial Intelligence (cs.AI) ,Computer Science - Distributed, Parallel, and Cluster Computing ,Computer Science - Artificial Intelligence ,Distributed, Parallel, and Cluster Computing (cs.DC) - Abstract
Artificial intelligence generated content (AIGC) has emerged as a promising technology to improve the efficiency, quality, diversity and flexibility of the content creation process by adopting a variety of generative AI models. Deploying AIGC services in wireless networks has been expected to enhance the user experience. However, the existing AIGC service provision suffers from several limitations, e.g., the centralized training in the pre-training, fine-tuning and inference processes, especially their implementations in wireless networks with privacy preservation. Federated learning (FL), as a collaborative learning framework where the model training is distributed to cooperative data owners without the need for data sharing, can be leveraged to simultaneously improve learning efficiency and achieve privacy protection for AIGC. To this end, we present FL-based techniques for empowering AIGC, and aim to enable users to generate diverse, personalized, and high-quality content. Furthermore, we conduct a case study of FL-aided AIGC fine-tuning by using the state-of-the-art AIGC model, i.e., stable diffusion model. Numerical results show that our scheme achieves advantages in effectively reducing the communication cost and training latency and privacy protection. Finally, we highlight several major research directions and open issues for the convergence of FL and AIGC., 8 pages, 3 figures and 2 tables. Submitted to IEEE Network
- Published
- 2023
19. Adversarial Attacks and Defenses for Semantic Communication in Vehicular Metaverses
- Author
-
Kang, Jiawen, He, Jiayi, Du, Hongyang, Xiong, Zehui, Yang, Zhaohui, Huang, Xumin, and Xie, Shengli
- Subjects
FOS: Computer and information sciences ,Artificial Intelligence (cs.AI) ,Computer Science - Cryptography and Security ,Computer Science - Artificial Intelligence ,Cryptography and Security (cs.CR) - Abstract
For vehicular metaverses, one of the ultimate user-centric goals is to optimize the immersive experience and Quality of Service (QoS) for users on board. Semantic Communication (SemCom) has been introduced as a revolutionary paradigm that significantly eases communication resource pressure for vehicular metaverse applications to achieve this goal. SemCom enables high-quality and ultra-efficient vehicular communication, even with explosively increasing data traffic among vehicles. In this article, we propose a hierarchical SemCom-enabled vehicular metaverses framework consisting of the global metaverse, local metaverses, SemCom module, and resource pool. The global and local metaverses are brand-new concepts from the metaverse's distribution standpoint. Considering the QoS of users, this article explores the potential security vulnerabilities of the proposed framework. To that purpose, this study highlights a specific security risk to the framework's SemCom module and offers a viable defense solution, so encouraging community researchers to focus more on vehicular metaverse security. Finally, we provide an overview of the open issues of secure SemCom in the vehicular metaverses, notably pointing out potential future research directions.
- Published
- 2023
20. The defender's perspective on automatic speaker verification: An overview
- Author
-
Wu, Haibin, Kang, Jiawen, Meng, Lingwei, Meng, Helen, and Lee, Hung-yi
- Subjects
FOS: Computer and information sciences ,Sound (cs.SD) ,Computer Science - Machine Learning ,Audio and Speech Processing (eess.AS) ,FOS: Electrical engineering, electronic engineering, information engineering ,Computer Science - Sound ,Machine Learning (cs.LG) ,Electrical Engineering and Systems Science - Audio and Speech Processing - Abstract
Automatic speaker verification (ASV) plays a critical role in security-sensitive environments. Regrettably, the reliability of ASV has been undermined by the emergence of spoofing attacks, such as replay and synthetic speech, as well as adversarial attacks and the relatively new partially fake speech. While there are several review papers that cover replay and synthetic speech, and adversarial attacks, there is a notable gap in a comprehensive review that addresses defense against adversarial attacks and the recently emerged partially fake speech. Thus, the aim of this paper is to provide a thorough and systematic overview of the defense methods used against these types of attacks., Accepted to IJCAI 2023 Workshop
- Published
- 2023
21. Joint Foundation Model Caching and Inference of Generative AI Services for Edge Intelligence
- Author
-
Xu, Minrui, Niyato, Dusit, Zhang, Hongliang, Kang, Jiawen, Xiong, Zehui, Mao, Shiwen, and Han, Zhu
- Subjects
Networking and Internet Architecture (cs.NI) ,FOS: Computer and information sciences ,Computer Science - Networking and Internet Architecture - Abstract
With the rapid development of artificial general intelligence (AGI), various multimedia services based on pretrained foundation models (PFMs) need to be effectively deployed. With edge servers that have cloud-level computing power, edge intelligence can extend the capabilities of AGI to mobile edge networks. However, compared with cloud data centers, resource-limited edge servers can only cache and execute a small number of PFMs, which typically consist of billions of parameters and require intensive computing power and GPU memory during inference. To address this challenge, in this paper, we propose a joint foundation model caching and inference framework that aims to balance the tradeoff among inference latency, accuracy, and resource consumption by managing cached PFMs and user requests efficiently during the provisioning of generative AI services. Specifically, considering the in-context learning ability of PFMs, a new metric named the Age of Context (AoC), is proposed to model the freshness and relevance between examples in past demonstrations and current service requests. Based on the AoC, we propose a least context caching algorithm to manage cached PFMs at edge servers with historical prompts and inference results. The numerical results demonstrate that the proposed algorithm can reduce system costs compared with existing baselines by effectively utilizing contextual information.
- Published
- 2023
22. Privacy Computing Meets Metaverse: Necessity, Taxonomy and Challenges
- Author
-
Chen, Chuan, Li, Yuecheng, Wu, Zhenpeng, Mai, Chengyuan, Liu, Youming, Hu, Yanming, Zheng, Zibin, and Kang, Jiawen
- Subjects
FOS: Computer and information sciences ,Computer Science - Computers and Society ,Computer Science - Cryptography and Security ,Computers and Society (cs.CY) ,Cryptography and Security (cs.CR) - Abstract
Metaverse, the core of the next-generation Internet, is a computer-generated holographic digital environment that simultaneously combines spatio-temporal, immersive, real-time, sustainable, interoperable, and data-sensitive characteristics. It cleverly blends the virtual and real worlds, allowing users to create, communicate, and transact in virtual form. With the rapid development of emerging technologies including augmented reality, virtual reality and blockchain, the metaverse system is becoming more and more sophisticated and widely used in various fields such as social, tourism, industry and economy. However, the high level of interaction with the real world also means a huge risk of privacy leakage both for individuals and enterprises, which has hindered the wide deployment of metaverse. Then, it is inevitable to apply privacy computing techniques in the framework of metaverse, which is a current research hotspot. In this paper, we conduct a comprehensive research of the necessity, taxonomy and challenges when privacy computing meets metaverse. Specifically, we first introduce the underlying technologies and various applications of metaverse, on which we analyze the challenges of data usage in metaverse, especially data privacy. Next, we review and summarize state-of-the-art solutions based on federated learning, differential privacy, homomorphic encryption, and zero-knowledge proofs for different privacy problems in metaverse. Finally, we show the current security and privacy challenges in the development of metaverse and provide open directions for building a well-established privacy-preserving metaverse system., 14 pages, 3 figures; Submitted to: IEEE INTERNET OF THINGS JOURNAL
- Published
- 2023
23. DADFNet: Dual Attention and Dual Frequency-Guided Dehazing Network for Video-Empowered Intelligent Transportation
- Author
-
Guo, Yu, Liu, Ryan Wen, Nie, Jiangtian, Lyu, Lingjuan, Xiong, Zehui, Kang, Jiawen, Yu, Han, and Niyato, Dusit
- Subjects
FOS: Computer and information sciences ,Computer Vision and Pattern Recognition (cs.CV) ,Computer Science - Computer Vision and Pattern Recognition - Abstract
Visual surveillance technology is an indispensable functional component of advanced traffic management systems. It has been applied to perform traffic supervision tasks, such as object detection, tracking and recognition. However, adverse weather conditions, e.g., fog, haze and mist, pose severe challenges for video-based transportation surveillance. To eliminate the influences of adverse weather conditions, we propose a dual attention and dual frequency-guided dehazing network (termed DADFNet) for real-time visibility enhancement. It consists of a dual attention module (DAM) and a high-low frequency-guided sub-net (HLFN) to jointly consider the attention and frequency mapping to guide haze-free scene reconstruction. Extensive experiments on both synthetic and real-world images demonstrate the superiority of DADFNet over state-of-the-art methods in terms of visibility enhancement and improvement in detection accuracy. Furthermore, DADFNet only takes $6.3$ ms to process a 1,920 * 1,080 image on the 2080 Ti GPU, making it highly efficient for deployment in intelligent transportation systems., This paper is accepted by AAAI 2022 Workshop: AI for Transportation
- Published
- 2023
24. Sparks of GPTs in Edge Intelligence for Metaverse: Caching and Inference for Mobile AIGC Services
- Author
-
Xu, Minrui, Niyato, Dusit, Zhang, Hongliang, Kang, Jiawen, Xiong, Zehui, Mao, Shiwen, and Han, Zhu
- Subjects
Networking and Internet Architecture (cs.NI) ,FOS: Computer and information sciences ,Computer Science - Networking and Internet Architecture - Abstract
Aiming at achieving artificial general intelligence (AGI) for Metaverse, pretrained foundation models (PFMs), e.g., generative pretrained transformers (GPTs), can effectively provide various AI services, such as autonomous driving, digital twins, and AI-generated content (AIGC) for extended reality. With the advantages of low latency and privacy-preserving, serving PFMs of mobile AI services in edge intelligence is a viable solution for caching and executing PFMs on edge servers with limited computing resources and GPU memory. However, PFMs typically consist of billions of parameters that are computation and memory-intensive for edge servers during loading and execution. In this article, we investigate edge PFM serving problems for mobile AIGC services of Metaverse. First, we introduce the fundamentals of PFMs and discuss their characteristic fine-tuning and inference methods in edge intelligence. Then, we propose a novel framework of joint model caching and inference for managing models and allocating resources to satisfy users' requests efficiently. Furthermore, considering the in-context learning ability of PFMs, we propose a new metric to evaluate the freshness and relevance between examples in demonstrations and executing tasks, namely the Age of Context (AoC). Finally, we propose a least context algorithm for managing cached models at edge servers by balancing the tradeoff among latency, energy consumption, and accuracy.
- Published
- 2023
25. FAST: Fidelity-Adjustable Semantic Transmission over Heterogeneous Wireless Networks
- Author
-
Li, Peichun, Cheng, Guoliang, Kang, Jiawen, Yu, Rong, Qian, Liping, Wu, Yuan, and Niyato, Dusit
- Subjects
Networking and Internet Architecture (cs.NI) ,Social and Information Networks (cs.SI) ,FOS: Computer and information sciences ,Computer Science - Networking and Internet Architecture ,Computer Science - Social and Information Networks - Abstract
In this work, we investigate the challenging problem of on-demand semantic communication over heterogeneous wireless networks. We propose a fidelity-adjustable semantic transmission framework (FAST) that empowers wireless devices to send data efficiently under different application scenarios and resource conditions. To this end, we first design a dynamic sub-model training scheme to learn the flexible semantic model, which enables edge devices to customize the transmission fidelity with different widths of the semantic model. After that, we focus on the FAST optimization problem to minimize the system energy consumption with latency and fidelity constraints. Following that, the optimal transmission strategies including the scaling factor of the semantic model, computing frequency, and transmitting power are derived for the devices. Experiment results indicate that, when compared to the baseline transmission schemes, the proposed framework can reduce up to one order of magnitude of the system energy consumption and data size for maintaining reasonable data fidelity., 6 pages, 4 figures. Accepted by ICC 2023
- Published
- 2023
26. Guiding AI-Generated Digital Content with Wireless Perception
- Author
-
Wang, Jiacheng, Du, Hongyang, Niyato, Dusit, Xiong, Zehui, Kang, Jiawen, Mao, Shiwen, Xuemin, and Shen
- Subjects
Networking and Internet Architecture (cs.NI) ,FOS: Computer and information sciences ,Computer Science - Networking and Internet Architecture ,Artificial Intelligence (cs.AI) ,Computer Science - Artificial Intelligence ,Computer Science - Human-Computer Interaction ,Human-Computer Interaction (cs.HC) - Abstract
Recent advances in artificial intelligence (AI), coupled with a surge in training data, have led to the widespread use of AI for digital content generation, with ChatGPT serving as a representative example. Despite the increased efficiency and diversity, the inherent instability of AI models poses a persistent challenge in guiding these models to produce the desired content for users. In this paper, we introduce an integration of wireless perception (WP) with AI-generated content (AIGC) and propose a unified WP-AIGC framework to improve the quality of digital content production. The framework employs a novel multi-scale perception technology to read user's posture, which is difficult to describe accurately in words, and transmits it to the AIGC model as skeleton images. Based on these images and user's service requirements, the AIGC model generates corresponding digital content. Since the production process imposes the user's posture as a constraint on the AIGC model, it makes the generated content more aligned with the user's requirements. Additionally, WP-AIGC can also accept user's feedback, allowing adjustment of computing resources at edge server to improve service quality. Experiments results verify the effectiveness of the WP-AIGC framework, highlighting its potential as a novel approach for guiding AI models in the accurate generation of digital content.
- Published
- 2023
27. Generative AI-aided Optimization for AI-Generated Content (AIGC) Services in Edge Networks
- Author
-
Du, Hongyang, Li, Zonghang, Niyato, Dusit, Kang, Jiawen, Xiong, Zehui, Huang, Huawei, and Mao, Shiwen
- Subjects
Networking and Internet Architecture (cs.NI) ,FOS: Computer and information sciences ,Computer Science - Networking and Internet Architecture - Abstract
As Metaverse emerges as the next-generation Internet paradigm, the ability to efficiently generate content is paramount. AI-Generated Content (AIGC) offers a promising solution to this challenge. However, the training and deployment of large AI models necessitate significant resources. To address this issue, we introduce an AIGC-as-a-Service (AaaS) architecture, which deploys AIGC models in wireless edge networks, ensuring ubiquitous access to AIGC services for Metaverse users. Nonetheless, a key aspect of providing personalized user experiences requires the careful selection of AIGC service providers (ASPs) capable of effectively executing user tasks. This selection process is complicated by environmental uncertainty and variability, a challenge not yet addressed well in existing literature. Therefore, we first propose a diffusion model-based AI-generated optimal decision (AGOD) algorithm, which can generate the optimal ASP selection decisions. We then apply AGOD to deep reinforcement learning (DRL), resulting in the Deep Diffusion Soft Actor-Critic (D2SAC) algorithm, which achieves efficient and effective ASP selection. Our comprehensive experiments demonstrate that D2SAC outperforms seven leading DRL algorithms. Furthermore, the proposed AGOD algorithm has the potential for extension to various optimization problems in wireless networks, positioning it a promising approach for the future research on AIGC-driven services in Metaverse. The implementation of our proposed method is available at: https://github.com/Lizonghang/AGOD.
- Published
- 2023
28. AI-Generated Incentive Mechanism and Full-Duplex Semantic Communications for Information Sharing
- Author
-
Du, Hongyang, Wang, Jiacheng, Niyato, Dusit, Kang, Jiawen, Xiong, Zehui, and Kim, Dong In
- Subjects
Signal Processing (eess.SP) ,FOS: Electrical engineering, electronic engineering, information engineering ,Electrical Engineering and Systems Science - Signal Processing - Abstract
The next generation of Internet services, such as Metaverse, rely on mixed reality (MR) technology to provide immersive user experiences. However, the limited computation power of MR headset-mounted devices (HMDs) hinders the deployment of such services. Therefore, we propose an efficient information sharing scheme based on full-duplex device-to-device (D2D) semantic communications to address this issue. Our approach enables users to avoid heavy and repetitive computational tasks, such as artificial intelligence-generated content (AIGC) in the view images of all MR users. Specifically, a user can transmit the generated content and semantic information extracted from their view image to nearby users, who can then use this information to obtain the spatial matching of computation results under their view images. We analyze the performance of full-duplex D2D communications, including the achievable rate and bit error probability, by using generalized small-scale fading models. To facilitate semantic information sharing among users, we design a contract theoretic AI-generated incentive mechanism. The proposed diffusion model generates the optimal contract design, outperforming two deep reinforcement learning algorithms, i.e., proximal policy optimization and soft actor-critic algorithms. Our numerical analysis experiment proves the effectiveness of our proposed methods. The code for this paper is available at https://github.com/HongyangDu/SemSharing, Accepted by IEEE JSAC
- Published
- 2023
29. Generative AI-empowered Simulation for Autonomous Driving in Vehicular Mixed Reality Metaverses
- Author
-
Xu, Minrui, Niyato, Dusit, Chen, Junlong, Zhang, Hongliang, Kang, Jiawen, Xiong, Zehui, Mao, Shiwen, and Han, Zhu
- Subjects
Networking and Internet Architecture (cs.NI) ,FOS: Computer and information sciences ,Computer Science - Networking and Internet Architecture ,Artificial Intelligence (cs.AI) ,Computer Science - Artificial Intelligence - Abstract
In the vehicular mixed reality (MR) Metaverse, the distance between physical and virtual entities can be overcome by fusing the physical and virtual environments with multi-dimensional communications in autonomous driving systems. Assisted by digital twin (DT) technologies, connected autonomous vehicles (AVs), roadside units (RSU), and virtual simulators can maintain the vehicular MR Metaverse via digital simulations for sharing data and making driving decisions collaboratively. However, large-scale traffic and driving simulation via realistic data collection and fusion from the physical world for online prediction and offline training in autonomous driving systems are difficult and costly. In this paper, we propose an autonomous driving architecture, where generative AI is leveraged to synthesize unlimited conditioned traffic and driving data in simulations for improving driving safety and traffic efficiency. First, we propose a multi-task DT offloading model for the reliable execution of heterogeneous DT tasks with different requirements at RSUs. Then, based on the preferences of AV's DTs and collected realistic data, virtual simulators can synthesize unlimited conditioned driving and traffic datasets to further improve robustness. Finally, we propose a multi-task enhanced auction-based mechanism to provide fine-grained incentives for RSUs in providing resources for autonomous driving. The property analysis and experimental results demonstrate that the proposed mechanism and architecture are strategy-proof and effective, respectively.
- Published
- 2023
30. Generative AI-empowered Effective Physical-Virtual Synchronization in the Vehicular Metaverse
- Author
-
Xu, Minrui, Niyato, Dusit, Zhang, Hongliang, Kang, Jiawen, Xiong, Zehui, Mao, Shiwen, and Han, Zhu
- Subjects
FOS: Computer and information sciences ,Artificial Intelligence (cs.AI) ,Computer Science - Artificial Intelligence - Abstract
Metaverse seamlessly blends the physical world and virtual space via ubiquitous communication and computing infrastructure. In transportation systems, the vehicular Metaverse can provide a fully-immersive and hyperreal traveling experience (e.g., via augmented reality head-up displays, AR-HUDs) to drivers and users in autonomous vehicles (AVs) via roadside units (RSUs). However, provisioning real-time and immersive services necessitates effective physical-virtual synchronization between physical and virtual entities, i.e., AVs and Metaverse AR recommenders (MARs). In this paper, we propose a generative AI-empowered physical-virtual synchronization framework for the vehicular Metaverse. In physical-to-virtual synchronization, digital twin (DT) tasks generated by AVs are offloaded for execution in RSU with future route generation. In virtual-to-physical synchronization, MARs customize diverse and personal AR recommendations via generative AI models based on user preferences. Furthermore, we propose a multi-task enhanced auction-based mechanism to match and price AVs and MARs for RSUs to provision real-time and effective services. Finally, property analysis and experimental results demonstrate that the proposed mechanism is strategy-proof and adverse-selection free while increasing social surplus by 50%., arXiv admin note: text overlap with arXiv:2211.06838
- Published
- 2023
31. AnycostFL: Efficient On-Demand Federated Learning over Heterogeneous Edge Devices
- Author
-
Li, Peichun, Cheng, Guoliang, Huang, Xumin, Kang, Jiawen, Yu, Rong, Wu, Yuan, and Pan, Miao
- Subjects
FOS: Computer and information sciences ,Computer Science - Machine Learning ,Computer Science - Distributed, Parallel, and Cluster Computing ,FOS: Electrical engineering, electronic engineering, information engineering ,Distributed, Parallel, and Cluster Computing (cs.DC) ,Systems and Control (eess.SY) ,Electrical Engineering and Systems Science - Systems and Control ,Machine Learning (cs.LG) - Abstract
In this work, we investigate the challenging problem of on-demand federated learning (FL) over heterogeneous edge devices with diverse resource constraints. We propose a cost-adjustable FL framework, named AnycostFL, that enables diverse edge devices to efficiently perform local updates under a wide range of efficiency constraints. To this end, we design the model shrinking to support local model training with elastic computation cost, and the gradient compression to allow parameter transmission with dynamic communication overhead. An enhanced parameter aggregation is conducted in an element-wise manner to improve the model performance. Focusing on AnycostFL, we further propose an optimization design to minimize the global training loss with personalized latency and energy constraints. By revealing the theoretical insights of the convergence analysis, personalized training strategies are deduced for different devices to match their locally available resources. Experiment results indicate that, when compared to the state-of-the-art efficient FL algorithms, our learning framework can reduce up to 1.9 times of the training latency and energy consumption for realizing a reasonable global testing accuracy. Moreover, the results also demonstrate that, our approach significantly improves the converged global accuracy., Accepted to IEEE INFOCOM 2023
- Published
- 2023
32. A Blockchain-based Semantic Exchange Framework for Web 3.0 toward Participatory Economy
- Author
-
Lin, Yijing, Gao, Zhipeng, Tu, Yaofeng, Du, Hongyang, Niyato, Dusit, Kang, Jiawen, and Yang, Hui
- Subjects
Networking and Internet Architecture (cs.NI) ,FOS: Computer and information sciences ,Computer Science - Networking and Internet Architecture - Abstract
Web 3.0 is the next-generation Internet that enables participants to read, write, and own contents in a decentralized manner. It is mainly driven by blockchain, semantic communication, edge computing, and artificial intelligence, which can construct value networks to achieve participatory economics based on participatory decision making. Web 3.0 can capture the characteristics of blockchain, semantic extraction, and communication to achieve decentralized semantic sharing and transfer information precisely. However, current Web 3.0 solutions focus on the blockchain while overlooking other new technologies' roles in Web 3.0. To further unleash the advantages of semantic extraction and communication in Web 3.0, in this paper, we propose a blockchain-based semantic exchange framework to realize fair and efficient interactions. In this framework, we first attempt to tokenize semantic information into Non-Fungible Token (NFT) for semantic exchange. Then we utilize a Stackelberg game to maximize buying and pricing strategies for semantic trading. We also leverage Zero-Knowledge Proof to share authentic semantic information without publishing it before receiving payments, which can achieve a fair and privacy-preserving trading compared with current NFT marketplaces. A case study about urban planning is given to show clearly the proposed mechanisms. Finally, several challenges and opportunities are identified., 7 pages, 5 figures and tables
- Published
- 2022
33. Wireless Sensing Data Collection and Processing for Metaverse Avatar Construction
- Author
-
Wang, Jiacheng, Du, Hongyang, Yang, Xiaolong, Niyato, Dusit, Kang, Jiawen, and Mao, Shiwen
- Subjects
Signal Processing (eess.SP) ,FOS: Electrical engineering, electronic engineering, information engineering ,Electrical Engineering and Systems Science - Signal Processing - Abstract
Recent advances in emerging technologies such as artificial intelligence and extended reality have pushed the Metaverse, a virtual, shared space, into reality. In Metaverse, users can customize virtual avatars to experience a different life. While impressive, avatar construction requires a lot of data that manifest users in the physical world from various perspectives, and wireless sensing data is one of them. For example, machine learning (ML) and signal processing can help extract information about user behavior from sensing data, thereby facilitating avatar behavior construction in the Metaverse. This article presents a wireless sensing dataset to support the emerging research on Metaverse avatar construction. Rigorously, the existing data collection platforms and datasets are analyzed first. On this basis, we introduce the platform used in this paper, as well as the data collection method and scenario. We observe that the collected sensing data, i.e., channel state information (CSI), suffers from a phase shift problem, which negatively affects the extraction of user information such as behavior and heartbeat and further deteriorates the avatar construction. Therefore, we propose to detect and correct this phase shift by a sliding window and phase compensation, respectively, and then validate the proposed scheme with the collected data. Finally, several research directions related to the avatar construction are given from the perspective of datasets.
- Published
- 2022
34. Semantic Communications for Wireless Sensing: RIS-aided Encoding and Self-supervised Decoding
- Author
-
Du, Hongyang, Wang, Jiacheng, Niyato, Dusit, Kang, Jiawen, Xiong, Zehui, Zhang, Junshan, Xuemin, and Shen
- Subjects
Signal Processing (eess.SP) ,FOS: Electrical engineering, electronic engineering, information engineering ,Electrical Engineering and Systems Science - Signal Processing - Abstract
Semantic communications can reduce the resource consumption by transmitting task-related semantic information extracted from source messages. However, when the source messages are utilized for various tasks, e.g., wireless sensing data for localization and activities detection, semantic communication technique is difficult to be implemented because of the increased processing complexity. In this paper, we propose the inverse semantic communications as a new paradigm. Instead of extracting semantic information from messages, we aim to encode the task-related source messages into a hyper-source message for data transmission or storage. Following this paradigm, we design an inverse semantic-aware wireless sensing framework with three algorithms for data sampling, reconfigurable intelligent surface (RIS)-aided encoding, and self-supervised decoding, respectively. Specifically, on the one hand, we propose a novel RIS hardware design for encoding several signal spectrums into one MetaSpectrum. To select the task-related signal spectrums for achieving efficient encoding, a semantic hash sampling method is introduced. On the other hand, we propose a self-supervised learning method for decoding the MetaSpectrums to obtain the original signal spectrums. Using the sensing data collected from real-world, we show that our framework can reduce the data volume by 95% compared to that before encoding, without affecting the accomplishment of sensing tasks. Moreover, compared with the typically used uniform sampling scheme, the proposed semantic hash sampling scheme can achieve 67% lower mean squared error in recovering the sensing parameters. In addition, experiment results demonstrate that the amplitude response matrix of the RIS enables the encryption of the sensing data.
- Published
- 2022
35. Stochastic Qubit Resource Allocation for Quantum Cloud Computing
- Author
-
Kaewpuang, Rakpong, Xu, Minrui, Niyato, Dusit, Yu, Han, Xiong, Zehui, and Kang, Jiawen
- Subjects
FOS: Computer and information sciences ,Quantum Physics ,Computer Science - Distributed, Parallel, and Cluster Computing ,FOS: Physical sciences ,Distributed, Parallel, and Cluster Computing (cs.DC) ,Quantum Physics (quant-ph) - Abstract
Quantum cloud computing is a promising paradigm for efficiently provisioning quantum resources (i.e., qubits) to users. In quantum cloud computing, quantum cloud providers provision quantum resources in reservation and on-demand plans for users. Literally, the cost of quantum resources in the reservation plan is expected to be cheaper than the cost of quantum resources in the on-demand plan. However, quantum resources in the reservation plan have to be reserved in advance without information about the requirement of quantum circuits beforehand, and consequently, the resources are insufficient, i.e., under-reservation. Hence, quantum resources in the on-demand plan can be used to compensate for the unsatisfied quantum resources required. To end this, we propose a quantum resource allocation for the quantum cloud computing system in which quantum resources and the minimum waiting time of quantum circuits are jointly optimized. Particularly, the objective is to minimize the total costs of quantum circuits under uncertainties regarding qubit requirement and minimum waiting time of quantum circuits. In experiments, practical circuits of quantum Fourier transform are applied to evaluate the proposed qubit resource allocation. The results illustrate that the proposed qubit resource allocation can achieve the optimal total costs., 8 pages, 10 figures, conference
- Published
- 2022
36. Cooperative Resource Management in Quantum Key Distribution (QKD) Networks for Semantic Communication
- Author
-
Kaewpuang, Rakpong, Xu, Minrui, Lim, Wei Yang Bryan, Niyato, Dusit, Yu, Han, Kang, Jiawen, and Shen, Xuemin Sherman
- Subjects
FOS: Computer and information sciences ,Computer Science - Cryptography and Security ,Cryptography and Security (cs.CR) - Abstract
Increasing privacy and security concerns in intelligence-native 6G networks require quantum key distribution-secured semantic information communication (QKD-SIC). In QKD-SIC systems, edge devices connected via quantum channels can efficiently encrypt semantic information from the semantic source, and securely transmit the encrypted semantic information to the semantic destination. In this paper, we consider an efficient resource (i.e., QKD and KM wavelengths) sharing problem to support QKD-SIC systems under the uncertainty of semantic information generated by edge devices. In such a system, QKD service providers offer QKD services with different subscription options to the edge devices. As such, to reduce the cost for the edge device users, we propose a QKD resource management framework for the edge devices communicating semantic information. The framework is based on a two-stage stochastic optimization model to achieve optimal QKD deployment. Moreover, to reduce the deployment cost of QKD service providers, QKD resources in the proposed framework can be utilized based on efficient QKD-SIC resource management, including semantic information transmission among edge devices, secret-key provisioning, and cooperation formation among QKD service providers. In detail, the formulated two-stage stochastic optimization model can achieve the optimal QKD-SIC resource deployment while meeting the secret-key requirements for semantic information transmission of edge devices. Moreover, to share the cost of the QKD resource pool among cooperative QKD service providers forming a coalition in a fair and interpretable manner, the proposed framework leverages the concept of Shapley value from cooperative game theory as a solution. Experimental results demonstrate that the proposed framework can reduce the deployment cost by about 40% compared with existing non-cooperative baselines., 16 pages, 20 figures, journal paper. arXiv admin note: text overlap with arXiv:2208.11270
- Published
- 2022
37. A conserved Toll-like receptor-to-NF-κB signaling pathway in the endangered coral Orbicella faveolata
- Author
-
Williams, Leah M., Fuess, Lauren E., Brennan, Joseph J., Mansfield, Katelyn M., Salas-Rodriguez, Erick, Welsh, Julianne, Awtry, Jake, Banic, Sarah, Chacko, Cecilia, Chezian, Aarthia, Dowers, Donovan, Estrada, Felicia, Hsieh, Yu-Hsuan, Kang, Jiawen, Li, Wanwen, Malchiodi, Zoe, Malinowski, John, Matuszak, Sean, McTigue, Thomas, IV, Mueller, David, Nguyen, Brian, Nguyen, Michelle, Nguyen, Phuong, Nguyen, Sinead, Njoku, Ndidi, Patel, Khusbu, Pellegrini, William, Pliakas, Tessa, Qadir, Deena, Ryan, Emma, Schiffer, Alex, Thiel, Amber, Yunes, Sarah A., Spilios, Kathryn E., Pinzón C, Jorge H., Mydlarz, Laura D., and Gilmore, Thomas D.
- Published
- 2018
- Full Text
- View/download PDF
38. Exploring Attention-Aware Network Resource Allocation for Customized Metaverse Services
- Author
-
Du, Hongyang, Wang, Jiacheng, Niyato, Dusit, Kang, Jiawen, Xiong, Zehui, Xuemin, Shen, and Kim, Dong In
- Subjects
Networking and Internet Architecture (cs.NI) ,FOS: Computer and information sciences ,Computer Science - Networking and Internet Architecture ,Artificial Intelligence (cs.AI) ,Computer Science - Artificial Intelligence - Abstract
Emerging with the support of computing and communications technologies, Metaverse is expected to bring users unprecedented service experiences. However, the increase in the number of Metaverse users places a heavy demand on network resources, especially for Metaverse services that are based on graphical extended reality and require rendering a plethora of virtual objects. To make efficient use of network resources and improve the Quality-of-Experience (QoE), we design an attention-aware network resource allocation scheme to achieve customized Metaverse services. The aim is to allocate more network resources to virtual objects in which users are more interested. We first discuss several key techniques related to Metaverse services, including QoE analysis, eye-tracking, and remote rendering. We then review existing datasets and propose the user-object-attention level (UOAL) dataset that contains the ground truth attention of 30 users to 96 objects in 1,000 images. A tutorial on how to use UOAL is presented. With the help of UOAL, we propose an attention-aware network resource allocation algorithm that has two steps, i.e., attention prediction and QoE maximization. Specially, we provide an overview of the designs of two types of attention prediction methods, i.e., interest-aware and time-aware prediction. By using the predicted user-object-attention values, network resources such as the rendering capacity of edge devices can be allocated optimally to maximize the QoE. Finally, we propose promising research directions related to Metaverse services.
- Published
- 2022
39. A Full Dive Into Realizing the Edge-Enabled Metaverse: Visions, Enabling Technologies, and Challenges.
- Author
-
Xu, Minrui, Ng, Wei Chong, Lim, Wei Yang Bryan, Kang, Jiawen, Xiong, Zehui, Niyato, Dusit, Yang, Qiang, Shen, Xuemin, and Miao, Chunyan
- Published
- 2023
- Full Text
- View/download PDF
40. Machine Learning-Powered Encrypted Network Traffic Analysis: A Comprehensive Survey.
- Author
-
Shen, Meng, Ye, Ke, Liu, Xingtong, Zhu, Liehuang, Kang, Jiawen, Yu, Shui, Li, Qi, and Xu, Ke
- Published
- 2023
- Full Text
- View/download PDF
41. Performance Analysis and Optimization for Jammer-Aided Multi-Antenna UAV Covert Communication
- Author
-
Du, Hongyang, Niyato, Dusit, Xie, Yuan-ai, Cheng, Yanyu, Kang, Jiawen, and Kim, Dong In
- Subjects
Performance (cs.PF) ,FOS: Computer and information sciences ,Computer Science - Performance ,Information Theory (cs.IT) ,Computer Science - Information Theory ,Data_CODINGANDINFORMATIONTHEORY - Abstract
Unmanned aerial vehicles (UAVs) have attracted a lot of research attention because of their high mobility and low cost in serving as temporary aerial base stations (BSs) and providing high data rates for next-generation communication networks. To protect user privacy while avoiding detection by a warden, we investigate a jammer-aided UAV covert communication system, which aims to maximize the user's covert rate with optimized transmit and jamming power. The UAV is equipped with multi-antennas to serve multi-users simultaneously and enhance the Quality of Service. By considering the general composite fading and shadowing channel models, we derive the exact probability density (PDF) and cumulative distribution functions (CDF) of the signal-to-interference-plusnoise ratio (SINR). The obtained PDF and CDF are used to derive the closed-form expressions for detection error probability and covert rate. Furthermore, the covert rate maximization problem is formulated as a Nash bargaining game, and the Nash bargaining solution (NBS) is introduced to investigate the negotiation among users. To solve the NBS, we propose two algorithms, i.e., particle swarm optimization-based and joint twostage power allocation algorithms, to achieve covertness and high data rates under the warden's optimal detection threshold. All formulated problems are proven to be convex, and the complexity is analyzed. The numerical results are presented to verify the theoretical performance analysis and show the effectiveness and success of achieving the covert communication of our algorithms.
- Published
- 2022
42. EPViSA: Efficient Auction Design for Real-time Physical-Virtual Synchronization in the Metaverse
- Author
-
Xu, Minrui, Niyato, Dusit, Wright, Benjamin, Zhang, Hongliang, Kang, Jiawen, Xiong, Zehui, Mao, Shiwen, and Han, Zhu
- Subjects
Computer Science - Networking and Internet Architecture ,Networking and Internet Architecture (cs.NI) ,FOS: Computer and information sciences - Abstract
Metaverse can obscure the boundary between the physical and virtual worlds. Specifically, for the Metaverse in vehicular networks, i.e., the vehicular Metaverse, vehicles are no longer isolated physical spaces but interfaces that extend the virtual worlds to the physical world. Accessing the Metaverse via autonomous vehicles (AVs), drivers and passengers can immerse in and interact with 3D virtual objects overlaying views of streets on head-up displays (HUD) via augmented reality (AR). The seamless, immersive, and interactive experience rather relies on real-time multi-dimensional data synchronization between physical entities, i.e., AVs, and virtual entities, i.e., Metaverse billboard providers (MBPs). However, mechanisms to allocate and match synchronizing AV and MBP pairs to roadside units (RSUs) in a synchronization service market, which consists of the physical and virtual submarkets, are vulnerable to adverse selection. In this paper, we propose an enhanced second-score auction-based mechanism, named EPViSA, to allocate physical and virtual entities in the synchronization service market of the vehicular Metaverse. The EPViSA mechanism can determine synchronizing AV and MBP pairs simultaneously while protecting participants from adverse selection and thus achieving high total social welfare. We propose a synchronization scoring rule to eliminate the external effects from the virtual submarkets. Then, a price scaling factor is introduced to enhance the allocation of synchronizing virtual entities in the virtual submarkets. Finally, rigorous analysis and extensive experimental results demonstrate that EPViSA can achieve at least 96\% of the social welfare compared to the omniscient benchmark while ensuring strategy-proof and adverse selection free through a simulation testbed.
- Published
- 2022
- Full Text
- View/download PDF
43. Learning-based Sustainable Multi-User Computation Offloading for Mobile Edge-Quantum Computing
- Author
-
Xu, Minrui, Niyato, Dusit, Kang, Jiawen, Xiong, Zehui, and Chen, Mingzhe
- Subjects
Networking and Internet Architecture (cs.NI) ,FOS: Computer and information sciences ,Computer Science - Networking and Internet Architecture - Abstract
In this paper, a novel paradigm of mobile edge-quantum computing (MEQC) is proposed, which brings quantum computing capacities to mobile edge networks that are closer to mobile users (i.e., edge devices). First, we propose an MEQC system model where mobile users can offload computational tasks to scalable quantum computers via edge servers with cryogenic components and fault-tolerant schemes. Second, we show that it is NP-hard to obtain a centralized solution to the partial offloading problem in MEQC in terms of the optimal latency and energy cost of classical and quantum computing. Third, we propose a multi-agent hybrid discrete-continuous deep reinforcement learning using proximal policy optimization to learn the long-term sustainable offloading strategy without prior knowledge. Finally, experimental results demonstrate that the proposed algorithm can reduce at least 30% of the cost compared with the existing baseline solutions under different system settings.
- Published
- 2022
- Full Text
- View/download PDF
44. Reliable Distributed Computing for Metaverse: A Hierarchical Game-Theoretic Approach
- Author
-
Jiang, Yuna, Kang, Jiawen, Niyato, Dusit, Ge, Xiaohu, Xiong, Zehui, Miao, Chunyan, Xuemin, and Shen
- Subjects
Networking and Internet Architecture (cs.NI) ,FOS: Computer and information sciences ,Computer Science - Networking and Internet Architecture - Abstract
The metaverse is regarded as a new wave of technological transformation that provides a virtual space for people to interact through digital avatars. To achieve immersive user experiences in the metaverse, real-time rendering is the key technology. However, computing-intensive tasks of real-time rendering from metaverse service providers cannot be processed efficiently on a single resource-limited mobile device. Alternatively, such mobile devices can offload the metaverse rendering tasks to other mobile devices by adopting the collaborative computing paradigm based on Coded Distributed Computing (CDC). Therefore, this paper introduces a hierarchical game-theoretic CDC framework for the metaverse services, especially for the vehicular metaverse. In the framework, idle resources from vehicles, acting as CDC workers, are aggregated to handle intensive computation tasks in the vehicular metaverse. Specifically, in the upper layer, a miner coalition formation game is formulated based on a reputation metric to select reliable workers. To guarantee the reliable management of reputation values, the reputation values calculated based on the subjective logical model are maintained in a blockchain database. In the lower layer, a Stackelberg game-based incentive mechanism is considered to attract reliable workers selected in the upper layer to participate in rendering tasks. The simulation results illustrate that the proposed framework is resistant to malicious workers. Compared with the best-effort worker selection scheme, the proposed scheme can improve the utility of metaverse service provider and the average profit of CDC workers.
- Published
- 2021
45. Wireless Edge-Empowered Metaverse: A Learning-Based Incentive Mechanism for Virtual Reality
- Author
-
Xu, Minrui, Niyato, Dusit, Kang, Jiawen, Zehui Xiong, Miao, Chunyan, and Kim, Dong In
- Subjects
FOS: Computer and information sciences ,Computer Science - Computers and Society ,Computer Science - Computer Science and Game Theory ,Computers and Society (cs.CY) ,Computer Science and Game Theory (cs.GT) - Abstract
The Metaverse is regarded as the next-generation Internet paradigm that allows humans to play, work, and socialize in an alternative virtual world with immersive experience, for instance, via head-mounted display for Virtual Reality (VR) rendering. With the help of ubiquitous wireless connections and powerful edge computing technologies, VR users in wireless edge-empowered Metaverse can immerse in the virtual through the access of VR services offered by different providers. However, VR applications are computation- and communication-intensive. The VR service providers (SPs) have to optimize the VR service delivery efficiently and economically given their limited communication and computation resources. An incentive mechanism can be thus applied as an effective tool for managing VR services between providers and users. Therefore, in this paper, we propose a learning-based Incentive Mechanism framework for VR services in the Metaverse. First, we propose the quality of perception as the metric for VR users immersing in the virtual world. Second, for quick trading of VR services between VR users (i.e., buyers) and VR SPs (i.e., sellers), we design a double Dutch auction mechanism to determine optimal pricing and allocation rules in this market. Third, for auction communication reduction, we design a deep reinforcement learning-based auctioneer to accelerate this auction process. Experimental results demonstrate that the proposed framework can achieve near-optimal social welfare while reducing at least half of the auction information exchange cost than baseline methods.
- Published
- 2021
46. Optimal Targeted Advertising Strategy For Secure Wireless Edge Metaverse
- Author
-
Du, Hongyang, Niyato, Dusit, Kang, Jiawen, Kim, Dong In, and Miao, Chunyan
- Subjects
FOS: Computer and information sciences ,Information Theory (cs.IT) ,Computer Science - Information Theory - Abstract
Recently, Metaverse has attracted increasing attention from both industry and academia, because of the significant potential to integrate real and digital worlds ever more seamlessly. By combining advanced wireless communications, edge computing and virtual reality (VR) technologies into Metaverse, a multidimensional, intelligent and powerful wireless edge Metaverse is created for future human society. In this paper, we design a privacy preserving targeted advertising strategy for the wireless edge Metaverse. Specifically, a Metaverse service provider (MSP) allocates bandwidth to the VR users so that the users can access Metaverse from edge access points. To protect users' privacy, the covert communication technique is used in the downlink. Then, the MSP can offer high-quality access services to earn more profits. Motivated by the concept of "covert", targeted advertising is used to promote the sale of bandwidth and ensure that the advertising strategy cannot be detected by competitors who may make counter-offer and by attackers who want to disrupt the services. We derive the best advertising strategy in terms of budget input, with the help of the Vidale-Wolfe model and Hamiltonian function. Furthermore, we propose a novel metric named Meta-Immersion to represent the user's experience feelings. The performance evaluation shows that the MSP can boost its revenue with an optimal targeted advertising strategy, especially compared with that without the advertising.
- Published
- 2021
47. Privacy-Preserving Anomaly Detection in Cloud Manufacturing Via Federated Transformer.
- Author
-
Ma, Shiyao, Nie, Jiangtian, Kang, Jiawen, Lyu, Lingjuan, Liu, Ryan Wen, Zhao, Ruihui, Liu, Ziyao, and Niyato, Dusit
- Abstract
With the rapid development of cloud manufacturing, industrial production with edge computing as the core architecture has been greatly developed. However, edge devices often suffer from abnormalities and failures in industrial production. Therefore, detecting these abnormal situations timely and accurately is crucial for cloud manufacturing. As such, a straightforward solution is that the edge device uploads the data to the cloud for anomaly detection. However, Industry 4.0 puts forward higher requirements for data privacy and security so that it is unrealistic to upload data from edge devices directly to the cloud. Considering the abovementioned severe challenges, this article customizes a weakly supervised edge computing anomaly detection framework, i.e., federated learning-based transformer framework (FedAnomaly), to deal with the anomaly detection problem in cloud manufacturing. Specifically, we introduce federated learning (FL) framework that allows edge devices to train an anomaly detection model in collaboration with the cloud without compromising privacy. To boost the privacy performance of the framework, we add differential privacy noise to the uploaded features. To further improve the ability of edge devices to extract abnormal features, we use the transformer to extract the feature representation of abnormal data. In this context, we design a novel collaborative learning protocol to promote efficient collaboration between FL and transformer. Furthermore, extensive case studies on four benchmark datasets verify the effectiveness of the proposed framework. To the best of our knowledge, this is the first time integrating FL and transformer to deal with anomaly detection problems in cloud manufacturing. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
48. SFGNet detecting objects via spatial fine-grained feature and enhanced RPN with spatial context.
- Author
-
Hu, Jun, Wang, Yongfeng, Cheng, Shuai, Liu, Jiaxin, Kang, Jiawen, and Yang, Wenxing
- Subjects
OBJECT recognition (Computer vision) ,CONVOLUTIONAL neural networks ,COMPUTATIONAL complexity - Abstract
Object detection, which is one of the most fundamental visual recognition tasks, has been a hotspot in computer vision. CNN (Convolutional Neural Networks) have been widely employed for building detector. Due to the success of RPN (Region Proposal Network), the two-stage detectors get both classification accuracy and precise regression bounding boxes. However, they still struggle in small-size object detection. In this paper, we present a deep network, namely Spatial Fine-Grained Network (SFGN). The SFGN that exploits Spatial Fine-Grained Features (SFGF) concatenates the higher resolution features, which is fine-grained with the low resolution features and high-level semantic by stacking spatial features for fine-grained features. An enhanced region proposal generator is proposed to get the objectless for small object to obtain a small set of proposal. The contextual information surrounding the region of interest is embedded using local spatial information for increasing the useful information and discriminating the background. For improving the detection performance, we use a simple yet surprisingly effective online hard example mining (OHEM) algorithm for training region proposal generator. It embeds an efficiently implemented soft non-maximum suppression (soft-NMS) for replacing with tradition NMS to obtain consistent improvements without increasing the computational complexity in inference. On PASCAL VOC 2007 and PASCAL VOC 2012 datasets, our SFGN improves baseline model from 81.2% mAP to 80.6% mAP. On MS COCO dataset, SFGN also performs better than baseline model. As intuition suggests, our detection results provide strong evidence that our SFGN improves detection accuracy, especially in small object test. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
49. Guest Editorial Special Issue on Intelligent Blockchain for Future Communications and Networking: Technologies, Trends, and Applications.
- Author
-
Huang, Huawei, Kanhere, Salil, Kang, Jiawen, Xiong, Zehui, Zhang, Lei, Krishnamachari, Bhaskar, Bertino, Elisa, and Yang, Sichao
- Subjects
BLOCKCHAINS ,TELECOMMUNICATION systems ,TELECOMMUNICATION ,COMMUNICATION of technical information ,MOBILE computing ,TRANSACTION costs - Abstract
Blockchain technology is becoming the cornerstone for the development and deployment of other technologies like Federated Learning (FL) and the Internet of Things (IoT), as it plays a critical role in data sharing and incentives. Blockchains supports decentralization, data-privacy protection, security, and reliability. Assuring secure data sharing in mobile computing and FL is challenging because of untrustworthy participants and unknown data quality. Blockchain provides trust in decentralized environments without requiring trusted third parties. By using smart contracts, blockchain has been able to supporting rich decentralized applications. However, the scalability of blockchain is a challenge that prevents its wide adoption by high-performance applications. To address the blockchain scalability issue, various blockchain sharding technologies and off-chain solutions have been proposed. To improve the network throughput, blockchain sharding divides the entire network into several smaller parallel groups and exploits fast consensus algorithms in blockchain shards. Off-chain solutions, such as payment channel networks (PCNs), transfer the slow on-chain transactions to the off-chain environment, in which transactions can be accelerated. Without consensus and on-chain expensive operations, off-chain scalable solutions significantly reduce transaction costs and increase transaction throughput. This special issue aims to provide a forum for the presentation of state-of-the-art research approaches that advance the construction of intelligent blockchain systems. A total of 27 articles were accepted after a two-round rigorous review process. Based on their topics, we have grouped the accepted articles into four categories: blockchain-based federated learning systems, blockchain and the IoT, blockchain scalability, and high-performance blockchains. In what follows, we introduce these articles and their contributions. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
50. Performance Analysis and Optimization for Jammer-Aided Multiantenna UAV Covert Communication.
- Author
-
Du, Hongyang, Niyato, Dusit, Xie, Yuan-Ai, Cheng, Yanyu, Kang, Jiawen, and Kim, Dong In
- Subjects
CUMULATIVE distribution function ,TELECOMMUNICATION systems ,NEXT generation networks ,ERROR probability ,QUALITY of service ,MULTIUSER computer systems ,SIGNAL-to-noise ratio - Abstract
Unmanned aerial vehicles (UAVs) have attracted a lot of research attention because of their high mobility and low cost in serving as temporary aerial base stations (BSs) and providing high data rates for next-generation communication networks. To protect user privacy while avoiding detection by a warden, we investigate a jammer-aided UAV covert communication system, which aims to maximize the user’s covert rate with optimized transmit and jamming power. The UAV is equipped with multi-antennas to serve multi-users simultaneously and enhance the Quality of Service. By considering the general composite fading and shadowing channel models, we derive the exact probability density (PDF) and cumulative distribution functions (CDF) of the signal-to-interference-plus-noise ratio (SINR). The obtained PDF and CDF are used to derive the closed-form expressions for detection error probability and covert rate. Furthermore, the covert rate maximization problem is formulated as a Nash bargaining game, and the Nash bargaining solution (NBS) is introduced to investigate the negotiation among users. To solve the NBS, we propose two algorithms, i.e., particle swarm optimization-based and joint two-stage power allocation algorithms, to achieve covertness and high data rates under the warden’s optimal detection threshold. All formulated problems are proven to be convex, and the complexity is analyzed. The numerical results are presented to verify the theoretical performance analysis and show the effectiveness and success of achieving the covert communication of our algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.