1,604 results on '"Nguyen Diep"'
Search Results
2. Dynamic Spectrum Access for Ambient Backscatter Communication-assisted D2D Systems with Quantum Reinforcement Learning
- Author
-
Van Huynh, Nguyen, Zhang, Bolun, Tran, Dinh-Hieu, Hoang, Dinh Thai, Nguyen, Diep N., Zheng, Gan, Niyato, Dusit, and Pham, Quoc-Viet
- Subjects
Computer Science - Networking and Internet Architecture ,Computer Science - Artificial Intelligence - Abstract
Spectrum access is an essential problem in device-to-device (D2D) communications. However, with the recent growth in the number of mobile devices, the wireless spectrum is becoming scarce, resulting in low spectral efficiency for D2D communications. To address this problem, this paper aims to integrate the ambient backscatter communication technology into D2D devices to allow them to backscatter ambient RF signals to transmit their data when the shared spectrum is occupied by mobile users. To obtain the optimal spectrum access policy, i.e., stay idle or access the shared spectrum and perform active transmissions or backscattering ambient RF signals for transmissions, to maximize the average throughput for D2D users, deep reinforcement learning (DRL) can be adopted. However, DRL-based solutions may require long training time due to the curse of dimensionality issue as well as complex deep neural network architectures. For that, we develop a novel quantum reinforcement learning (RL) algorithm that can achieve a faster convergence rate with fewer training parameters compared to DRL thanks to the quantum superposition and quantum entanglement principles. Specifically, instead of using conventional deep neural networks, the proposed quantum RL algorithm uses a parametrized quantum circuit to approximate an optimal policy. Extensive simulations then demonstrate that the proposed solution not only can significantly improve the average throughput of D2D devices when the shared spectrum is busy but also can achieve much better performance in terms of convergence rate and learning complexity compared to existing DRL-based methods., Comment: 12 pages, 7 figures
- Published
- 2024
3. Point Cloud Compression with Bits-back Coding
- Author
-
Hieu, Nguyen Quang, Nguyen, Minh, Hoang, Dinh Thai, Nguyen, Diep N., and Dutkiewicz, Eryk
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Artificial Intelligence ,Computer Science - Machine Learning - Abstract
This paper introduces a novel lossless compression method for compressing geometric attributes of point cloud data with bits-back coding. Our method specializes in using a deep learning-based probabilistic model to estimate the Shannon's entropy of the point cloud information, i.e., geometric attributes of the 3D floating points. Once the entropy of the point cloud dataset is estimated with a convolutional variational autoencoder (CVAE), we use the learned CVAE model to compress the geometric attributes of the point clouds with the bits-back coding technique. The novelty of our method with bits-back coding specializes in utilizing the learned latent variable model of the CVAE to compress the point cloud data. By using bits-back coding, we can capture the potential correlation between the data points, such as similar spatial features like shapes and scattering regions, into the lower-dimensional latent space to further reduce the compression ratio. The main insight of our method is that we can achieve a competitive compression ratio as conventional deep learning-based approaches, while significantly reducing the overhead cost of storage and/or communicating the compression codec, making our approach more applicable in practical scenarios. Throughout comprehensive evaluations, we found that the cost for the overhead is significantly small, compared to the reduction of the compression ratio when compressing large point cloud datasets. Experiment results show that our proposed approach can achieve a compression ratio of 1.56 bit-per-point on average, which is significantly lower than the baseline approach such as Google's Draco with a compression ratio of 1.83 bit-per-point., Comment: This paper is under reviewed in IEEE Robotics and Automation Letters
- Published
- 2024
4. A Lightweight Human Pose Estimation Approach for Edge Computing-Enabled Metaverse with Compressive Sensing
- Author
-
Hieu, Nguyen Quang, Hoang, Dinh Thai, and Nguyen, Diep N.
- Subjects
Electrical Engineering and Systems Science - Signal Processing ,Computer Science - Artificial Intelligence - Abstract
The ability to estimate 3D movements of users over edge computing-enabled networks, such as 5G/6G networks, is a key enabler for the new era of extended reality (XR) and Metaverse applications. Recent advancements in deep learning have shown advantages over optimization techniques for estimating 3D human poses given spare measurements from sensor signals, i.e., inertial measurement unit (IMU) sensors attached to the XR devices. However, the existing works lack applicability to wireless systems, where transmitting the IMU signals over noisy wireless networks poses significant challenges. Furthermore, the potential redundancy of the IMU signals has not been considered, resulting in highly redundant transmissions. In this work, we propose a novel approach for redundancy removal and lightweight transmission of IMU signals over noisy wireless environments. Our approach utilizes a random Gaussian matrix to transform the original signal into a lower-dimensional space. By leveraging the compressive sensing theory, we have proved that the designed Gaussian matrix can project the signal into a lower-dimensional space and preserve the Set-Restricted Eigenvalue condition, subject to a power transmission constraint. Furthermore, we develop a deep generative model at the receiver to recover the original IMU signals from noisy compressed data, thus enabling the creation of 3D human body movements at the receiver for XR and Metaverse applications. Simulation results on a real-world IMU dataset show that our framework can achieve highly accurate 3D human poses of the user using only $82\%$ of the measurements from the original signals. This is comparable to an optimization-based approach, i.e., Lasso, but is an order of magnitude faster.
- Published
- 2024
5. Homomorphic Encryption-Enabled Federated Learning for Privacy-Preserving Intrusion Detection in Resource-Constrained IoV Networks
- Author
-
Manh, Bui Duc, Nguyen, Chi-Hieu, Hoang, Dinh Thai, and Nguyen, Diep N.
- Subjects
Computer Science - Cryptography and Security - Abstract
This paper aims to propose a novel framework to address the data privacy issue for Federated Learning (FL)-based Intrusion Detection Systems (IDSs) in Internet-of-Vehicles(IoVs) with limited computational resources. In particular, in conventional FL systems, it is usually assumed that the computing nodes have sufficient computational resources to process the training tasks. However, in practical IoV systems, vehicles usually have limited computational resources to process intensive training tasks, compromising the effectiveness of deploying FL in IDSs. While offloading data from vehicles to the cloud can mitigate this issue, it introduces significant privacy concerns for vehicle users (VUs). To resolve this issue, we first propose a highly-effective framework using homomorphic encryption to secure data that requires offloading to a centralized server for processing. Furthermore, we develop an effective training algorithm tailored to handle the challenges of FL-based systems with encrypted data. This algorithm allows the centralized server to directly compute on quantum-secure encrypted ciphertexts without needing decryption. This approach not only safeguards data privacy during the offloading process from VUs to the centralized server but also enhances the efficiency of utilizing FL for IDSs in IoV systems. Our simulation results show that our proposed approach can achieve a performance that is as close to that of the solution without encryption, with a gap of less than 0.8%.
- Published
- 2024
6. Real-time Cyberattack Detection with Collaborative Learning for Blockchain Networks
- Author
-
Khoa, Tran Viet, Son, Do Hai, Hoang, Dinh Thai, Trung, Nguyen Linh, Quynh, Tran Thi Thuy, Nguyen, Diep N., Ha, Nguyen Viet, and Dutkiewicz, Eryk
- Subjects
Computer Science - Cryptography and Security - Abstract
With the ever-increasing popularity of blockchain applications, securing blockchain networks plays a critical role in these cyber systems. In this paper, we first study cyberattacks (e.g., flooding of transactions, brute pass) in blockchain networks and then propose an efficient collaborative cyberattack detection model to protect blockchain networks. Specifically, we deploy a blockchain network in our laboratory to build a new dataset including both normal and attack traffic data. The main aim of this dataset is to generate actual attack data from different nodes in the blockchain network that can be used to train and test blockchain attack detection models. We then propose a real-time collaborative learning model that enables nodes in the network to share learning knowledge without disclosing their private data, thereby significantly enhancing system performance for the whole network. The extensive simulation and real-time experimental results show that our proposed detection model can detect attacks in the blockchain network with an accuracy of up to 97%.
- Published
- 2024
- Full Text
- View/download PDF
7. ToVo: Toxicity Taxonomy via Voting
- Author
-
Luong, Tinh Son, Le, Thanh-Thien, Doan, Thang Viet, Van, Linh Ngo, Nguyen, Thien Huu, and Nguyen, Diep Thi-Ngoc
- Subjects
Computer Science - Computation and Language ,Computer Science - Machine Learning - Abstract
Existing toxic detection models face significant limitations, such as lack of transparency, customization, and reproducibility. These challenges stem from the closed-source nature of their training data and the paucity of explanations for their evaluation mechanism. To address these issues, we propose a dataset creation mechanism that integrates voting and chain-of-thought processes, producing a high-quality open-source dataset for toxic content detection. Our methodology ensures diverse classification metrics for each sample and includes both classification scores and explanatory reasoning for the classifications. We utilize the dataset created through our proposed mechanism to train our model, which is then compared against existing widely-used detectors. Our approach not only enhances transparency and customizability but also facilitates better fine-tuning for specific use cases. This work contributes a robust framework for developing toxic content detection models, emphasizing openness and adaptability, thus paving the way for more effective and user-specific content moderation solutions.
- Published
- 2024
8. The Role of AI in Peer Support for Young People: A Study of Preferences for Human- and AI-Generated Responses
- Author
-
Young, Jordyn, Jawara, Laala M, Nguyen, Diep N, Daly, Brian, Huh-Yoo, Jina, and Razi, Afsaneh
- Subjects
Computer Science - Human-Computer Interaction ,Computer Science - Artificial Intelligence - Abstract
Generative Artificial Intelligence (AI) is integrated into everyday technology, including news, education, and social media. AI has further pervaded private conversations as conversational partners, auto-completion, and response suggestions. As social media becomes young people's main method of peer support exchange, we need to understand when and how AI can facilitate and assist in such exchanges in a beneficial, safe, and socially appropriate way. We asked 622 young people to complete an online survey and evaluate blinded human- and AI-generated responses to help-seeking messages. We found that participants preferred the AI-generated response to situations about relationships, self-expression, and physical health. However, when addressing a sensitive topic, like suicidal thoughts, young people preferred the human response. We also discuss the role of training in online peer support exchange and its implications for supporting young people's well-being. Disclaimer: This paper includes sensitive topics, including suicide ideation. Reader discretion is advised.
- Published
- 2024
- Full Text
- View/download PDF
9. DDPG-E2E: A Novel Policy Gradient Approach for End-to-End Communication Systems
- Author
-
Zhang, Bolun, Van Huynh, Nguyen, Hoang, Dinh Thai, Nguyen, Diep N., and Pham, Quoc-Viet
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
The End-to-end (E2E) learning-based approach has great potential to reshape the existing communication systems by replacing the transceivers with deep neural networks. To this end, the E2E learning approach needs to assume the availability of prior channel information to mathematically formulate a differentiable channel layer for the backpropagation (BP) of the error gradients, thereby jointly optimizing the transmitter and the receiver. However, accurate and instantaneous channel state information is hardly obtained in practical wireless communication scenarios. Moreover, the existing E2E learning-based solutions exhibit limited performance in data transmissions with large block lengths. In this article, these practical issues are addressed by our proposed deep deterministic policy gradient-based E2E communication system. In particular, the proposed solution utilizes a reward feedback mechanism to train both the transmitter and the receiver, which alleviates the information loss of error gradients during BP. In addition, a convolutional neural network (CNN)-based architecture is developed to mitigate the curse of dimensionality problem when transmitting messages with large block lengths. Extensive simulations then demonstrate that our proposed solution can not only jointly train the transmitter and the receiver simultaneously without requiring the prior channel knowledge but also can obtain significant performance improvement on block error rate compared to state-of-the-art solutions.
- Published
- 2024
10. Multiple-Input Auto-Encoder Guided Feature Selection for IoT Intrusion Detection Systems
- Author
-
Dinh, Phai Vu, Nguyen, Diep N., Hoang, Dinh Thai, Nguyen, Quang Uy, Dutkiewicz, Eryk, and Bao, Son Pham
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence ,Computer Science - Cryptography and Security - Abstract
While intrusion detection systems (IDSs) benefit from the diversity and generalization of IoT data features, the data diversity (e.g., the heterogeneity and high dimensions of data) also makes it difficult to train effective machine learning models in IoT IDSs. This also leads to potentially redundant/noisy features that may decrease the accuracy of the detection engine in IDSs. This paper first introduces a novel neural network architecture called Multiple-Input Auto-Encoder (MIAE). MIAE consists of multiple sub-encoders that can process inputs from different sources with different characteristics. The MIAE model is trained in an unsupervised learning mode to transform the heterogeneous inputs into lower-dimensional representation, which helps classifiers distinguish between normal behaviour and different types of attacks. To distil and retain more relevant features but remove less important/redundant ones during the training process, we further design and embed a feature selection layer right after the representation layer of MIAE resulting in a new model called MIAEFS. This layer learns the importance of features in the representation vector, facilitating the selection of informative features from the representation vector. The results on three IDS datasets, i.e., NSLKDD, UNSW-NB15, and IDS2017, show the superior performance of MIAE and MIAEFS compared to other methods, e.g., conventional classifiers, dimensionality reduction models, unsupervised representation learning methods with different input dimensions, and unsupervised feature selection models. Moreover, MIAE and MIAEFS combined with the Random Forest (RF) classifier achieve accuracy of 96.5% in detecting sophisticated attacks, e.g., Slowloris. The average running time for detecting an attack sample using RF with the representation of MIAE and MIAEFS is approximate 1.7E-6 seconds, whilst the model size is lower than 1 MB.
- Published
- 2024
11. Twin Auto-Encoder Model for Learning Separable Representation in Cyberattack Detection
- Author
-
Dinh, Phai Vu, Nguyen, Quang Uy, Dinh, Thai Hoang, Nguyen, Diep N., Pham, Bao Son, and Dutkiewicz, Eryk
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Artificial Intelligence ,Computer Science - Machine Learning - Abstract
Representation Learning (RL) plays a pivotal role in the success of many problems including cyberattack detection. Most of the RL methods for cyberattack detection are based on the latent vector of Auto-Encoder (AE) models. An AE transforms raw data into a new latent representation that better exposes the underlying characteristics of the input data. Thus, it is very useful for identifying cyberattacks. However, due to the heterogeneity and sophistication of cyberattacks, the representation of AEs is often entangled/mixed resulting in the difficulty for downstream attack detection models. To tackle this problem, we propose a novel mod called Twin Auto-Encoder (TAE). TAE deterministically transforms the latent representation into a more distinguishable representation namely the \textit{separable representation} and the reconstructsuct the separable representation at the output. The output of TAE called the \textit{reconstruction representation} is input to downstream models to detect cyberattacks. We extensively evaluate the effectiveness of TAE using a wide range of bench-marking datasets. Experiment results show the superior accuracy of TAE over state-of-the-art RL models and well-known machine learning algorithms. Moreover, TAE also outperforms state-of-the-art models on some sophisticated and challenging attacks. We then investigate various characteristics of TAE to further demonstrate its superiority.
- Published
- 2024
12. Emerging Technologies for 6G Non-Terrestrial-Networks: From Academia to Industrial Applications
- Author
-
Nguyen, Cong T., Saputra, Yuris Mulya, Van Huynh, Nguyen, Nguyen, Tan N., Hoang, Dinh Thai, Nguyen, Diep N, Pham, Van-Quan, Voznak, Miroslav, Chatzinotas, Symeon, and Tran, Dinh-Hieu
- Subjects
Computer Science - Networking and Internet Architecture ,Computer Science - Emerging Technologies - Abstract
Terrestrial networks form the fundamental infrastructure of modern communication systems, serving more than 4 billion users globally. However, terrestrial networks are facing a wide range of challenges, from coverage and reliability to interference and congestion. As the demands of the 6G era are expected to be much higher, it is crucial to address these challenges to ensure a robust and efficient communication infrastructure for the future. To address these problems, Non-terrestrial Network (NTN) has emerged to be a promising solution. NTNs are communication networks that leverage airborne (e.g., unmanned aerial vehicles) and spaceborne vehicles (e.g., satellites) to facilitate ultra-reliable communications and connectivity with high data rates and low latency over expansive regions. This article aims to provide a comprehensive survey on the utilization of network slicing, Artificial Intelligence/Machine Learning (AI/ML), and Open Radio Access Network (ORAN) to address diverse challenges of NTNs from the perspectives of both academia and industry. Particularly, we first provide an in-depth tutorial on NTN and the key enabling technologies including network slicing, AI/ML, and ORAN. Then, we provide a comprehensive survey on how network slicing and AI/ML have been leveraged to overcome the challenges that NTNs are facing. Moreover, we present how ORAN can be utilized for NTNs. Finally, we highlight important challenges, open issues, and future research directions of NTN in the 6G era., Comment: 35 pages
- Published
- 2024
13. Disrupting internationalisation of the curriculum in Latin America
- Author
-
Whitsed, Craig, Cassol, Carla Camargo, Leask, Betty, Morosini, Marilia Costa, Elsner, Cristina, and Nguyen, Diep
- Published
- 2024
- Full Text
- View/download PDF
14. CNN-FL for Biotechnology Industry Empowered by Internet-of-BioNano Things and Digital Twins
- Author
-
Mohammad, Jamshidi, Hoang, Dinh Thai, and Nguyen, Diep N.
- Subjects
Computer Science - Machine Learning ,Electrical Engineering and Systems Science - Image and Video Processing ,Quantitative Biology - Quantitative Methods - Abstract
Digital twins (DTs) are revolutionizing the biotechnology industry by enabling sophisticated digital representations of biological assets, microorganisms, drug development processes, and digital health applications. However, digital twinning at micro and nano scales, particularly in modeling complex entities like bacteria, presents significant challenges in terms of requiring advanced Internet of Things (IoT) infrastructure and computing approaches to achieve enhanced accuracy and scalability. In this work, we propose a novel framework that integrates the Internet of Bio-Nano Things (IoBNT) with advanced machine learning techniques, specifically convolutional neural networks (CNN) and federated learning (FL), to effectively tackle the identified challenges. Within our framework, IoBNT devices are deployed to gather image-based biological data across various physical environments, leveraging the strong capabilities of CNNs for robust machine vision and pattern recognition. Subsequently, FL is utilized to aggregate insights from these disparate data sources, creating a refined global model that continually enhances accuracy and predictive reliability, which is crucial for the effective deployment of DTs in biotechnology. The primary contribution is the development of a novel framework that synergistically combines CNN and FL, augmented by the capabilities of the IoBNT. This novel approach is specifically tailored to enhancing DTs in the biotechnology industry. The results showcase enhancements in the reliability and safety of microorganism DTs, while preserving their accuracy. Furthermore, the proposed framework excels in energy efficiency and security, offering a user-friendly and adaptable solution. This broadens its applicability across diverse sectors, including biotechnology and pharmaceutical industries, as well as clinical and hospital settings.
- Published
- 2024
15. Generative AI-enabled Blockchain Networks: Fundamentals, Applications, and Case Study
- Author
-
Nguyen, Cong T., Liu, Yinqiu, Du, Hongyang, Hoang, Dinh Thai, Niyato, Dusit, Nguyen, Diep N., and Mao, Shiwen
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Artificial Intelligence - Abstract
Generative Artificial Intelligence (GAI) has recently emerged as a promising solution to address critical challenges of blockchain technology, including scalability, security, privacy, and interoperability. In this paper, we first introduce GAI techniques, outline their applications, and discuss existing solutions for integrating GAI into blockchains. Then, we discuss emerging solutions that demonstrate the effectiveness of GAI in addressing various challenges of blockchain, such as detecting unknown blockchain attacks and smart contract vulnerabilities, designing key secret sharing schemes, and enhancing privacy. Moreover, we present a case study to demonstrate that GAI, specifically the generative diffusion model, can be employed to optimize blockchain network performance metrics. Experimental results clearly show that, compared to a baseline traditional AI approach, the proposed generative diffusion model approach can converge faster, achieve higher rewards, and significantly improve the throughput and latency of the blockchain network. Additionally, we highlight future research directions for GAI in blockchain applications, including personalized GAI-enabled blockchains, GAI-blockchain synergy, and privacy and security considerations within blockchain ecosystems.
- Published
- 2024
16. A Novel Blockchain Based Information Management Framework for Web 3.0
- Author
-
Hassan, Md Arif, Nguyen, Cong T., Nguyen, Chi-Hieu, Hoang, Dinh Thai, Nguyen, Diep N., and Dutkiewicz, Eryk
- Subjects
Computer Science - Cryptography and Security - Abstract
Web 3.0 is the third generation of the World Wide Web (WWW), concentrating on the critical concepts of decentralization, availability, and increasing client usability. Although Web 3.0 is undoubtedly an essential component of the future Internet, it currently faces critical challenges, including decentralized data collection and management. To overcome these challenges, blockchain has emerged as one of the core technologies for the future development of Web 3.0. In this paper, we propose a novel blockchain-based information management framework, namely Smart Blockchain-based Web, to manage information in Web 3.0 effectively, enhance the security and privacy of users data, bring additional profits, and incentivize users to contribute information to the websites. Particularly, SBW utilizes blockchain technology and smart contracts to manage the decentralized data collection process for Web 3.0 effectively. Moreover, in this framework, we develop an effective consensus mechanism based on Proof-of-Stake to reward the user's information contribution and conduct game theoretical analysis to analyze the users behavior in the considered system. Additionally, we conduct simulations to assess the performance of SBW and investigate the impact of critical parameters on information contribution. The findings confirm our theoretical analysis and demonstrate that our proposed consensus mechanism can incentivize the nodes and users to contribute more information to our systems.
- Published
- 2024
17. Enabling Technologies for Web 3.0: A Comprehensive Survey
- Author
-
Hassan, Md Arif, Jamshidi, Mohammad Behdad, Manh, Bui Duc, Chu, Nam H., Nguyen, Chi-Hieu, Hieu, Nguyen Quang, Nguyen, Cong T., Hoang, Dinh Thai, Nguyen, Diep N., Van Huynh, Nguyen, Alsheikh, Mohammad Abu, and Dutkiewicz, Eryk
- Subjects
Computer Science - Computers and Society - Abstract
Web 3.0 represents the next stage of Internet evolution, aiming to empower users with increased autonomy, efficiency, quality, security, and privacy. This evolution can potentially democratize content access by utilizing the latest developments in enabling technologies. In this paper, we conduct an in-depth survey of enabling technologies in the context of Web 3.0, such as blockchain, semantic web, 3D interactive web, Metaverse, Virtual reality/Augmented reality, Internet of Things technology, and their roles in shaping Web 3.0. We commence by providing a comprehensive background of Web 3.0, including its concept, basic architecture, potential applications, and industry adoption. Subsequently, we examine recent breakthroughs in IoT, 5G, and blockchain technologies that are pivotal to Web 3.0 development. Following that, other enabling technologies, including AI, semantic web, and 3D interactive web, are discussed. Utilizing these technologies can effectively address the critical challenges in realizing Web 3.0, such as ensuring decentralized identity, platform interoperability, data transparency, reducing latency, and enhancing the system's scalability. Finally, we highlight significant challenges associated with Web 3.0 implementation, emphasizing potential solutions and providing insights into future research directions in this field.
- Published
- 2023
18. Securing MIMO Wiretap Channel with Learning-Based Friendly Jamming under Imperfect CSI
- Author
-
Tuan, Bui Minh, Nguyen, Diep N., Trung, Nguyen Linh, Nguyen, Van-Dinh, Van Huynh, Nguyen, Hoang, Dinh Thai, Krunz, Marwan, and Dutkiewicz, Eryk
- Subjects
Computer Science - Information Theory ,Electrical Engineering and Systems Science - Signal Processing - Abstract
Wireless communications are particularly vulnerable to eavesdropping attacks due to their broadcast nature. To effectively deal with eavesdroppers, existing security techniques usually require accurate channel state information (CSI), e.g., for friendly jamming (FJ), and/or additional computing resources at transceivers, e.g., cryptography-based solutions, which unfortunately may not be feasible in practice. This challenge is even more acute in low-end IoT devices. We thus introduce a novel deep learning-based FJ framework that can effectively defeat eavesdropping attacks with imperfect CSI and even without CSI of legitimate channels. In particular, we first develop an autoencoder-based communication architecture with FJ, namely AEFJ, to jointly maximize the secrecy rate and minimize the block error rate at the receiver without requiring perfect CSI of the legitimate channels. In addition, to deal with the case without CSI, we leverage the mutual information neural estimation (MINE) concept and design a MINE-based FJ scheme that can achieve comparable security performance to the conventional FJ methods that require perfect CSI. Extensive simulations in a multiple-input multiple-output (MIMO) system demonstrate that our proposed solution can effectively deal with eavesdropping attacks in various settings. Moreover, the proposed framework can seamlessly integrate MIMO security and detection tasks into a unified end-to-end learning process. This integrated approach can significantly maximize the throughput and minimize the block error rate, offering a good solution for enhancing communication security in wireless communication systems., Comment: 12 pages, 15 figures
- Published
- 2023
19. Generative AI for Physical Layer Communications: A Survey
- Author
-
Van Huynh, Nguyen, Wang, Jiacheng, Du, Hongyang, Hoang, Dinh Thai, Niyato, Dusit, Nguyen, Diep N., Kim, Dong In, and Letaief, Khaled B.
- Subjects
Computer Science - Networking and Internet Architecture ,Computer Science - Artificial Intelligence - Abstract
The recent evolution of generative artificial intelligence (GAI) leads to the emergence of groundbreaking applications such as ChatGPT, which not only enhances the efficiency of digital content production, such as text, audio, video, or even network traffic data, but also enriches its diversity. Beyond digital content creation, GAI's capability in analyzing complex data distributions offers great potential for wireless communications, particularly amidst a rapid expansion of new physical layer communication technologies. For example, the diffusion model can learn input signal distributions and use them to improve the channel estimation accuracy, while the variational autoencoder can model channel distribution and infer latent variables for blind channel equalization. Therefore, this paper presents a comprehensive investigation of GAI's applications for communications at the physical layer, ranging from traditional issues, including signal classification, channel estimation, and equalization, to emerging topics, such as intelligent reflecting surfaces and joint source channel coding. We also compare GAI-enabled physical layer communications with those supported by traditional AI, highlighting GAI's inherent capabilities and unique contributions in these areas. Finally, the paper discusses open issues and proposes several future research directions, laying a foundation for further exploration and advancement of GAI in physical layer communications.
- Published
- 2023
20. Constrained Twin Variational Auto-Encoder for Intrusion Detection in IoT Systems
- Author
-
Dinh, Phai Vu, Nguyen, Quang Uy, Hoang, Dinh Thai, Nguyen, Diep N., Bao, Son Pham, and Dutkiewicz, Eryk
- Subjects
Computer Science - Machine Learning ,Computer Science - Cryptography and Security - Abstract
Intrusion detection systems (IDSs) play a critical role in protecting billions of IoT devices from malicious attacks. However, the IDSs for IoT devices face inherent challenges of IoT systems, including the heterogeneity of IoT data/devices, the high dimensionality of training data, and the imbalanced data. Moreover, the deployment of IDSs on IoT systems is challenging, and sometimes impossible, due to the limited resources such as memory/storage and computing capability of typical IoT devices. To tackle these challenges, this article proposes a novel deep neural network/architecture called Constrained Twin Variational Auto-Encoder (CTVAE) that can feed classifiers of IDSs with more separable/distinguishable and lower-dimensional representation data. Additionally, in comparison to the state-of-the-art neural networks used in IDSs, CTVAE requires less memory/storage and computing power, hence making it more suitable for IoT IDS systems. Extensive experiments with the 11 most popular IoT botnet datasets show that CTVAE can boost around 1% in terms of accuracy and Fscore in detection attack compared to the state-of-the-art machine learning and representation learning methods, whilst the running time for attack detection is lower than 2E-6 seconds and the model size is lower than 1 MB. We also further investigate various characteristics of CTVAE in the latent space and in the reconstruction representation to demonstrate its efficacy compared with current well-known methods.
- Published
- 2023
21. Reconstructing Human Pose from Inertial Measurements: A Generative Model-based Compressive Sensing Approach
- Author
-
Hieu, Nguyen Quang, Hoang, Dinh Thai, Nguyen, Diep N., and Alsheikh, Mohammad Abu
- Subjects
Computer Science - Human-Computer Interaction - Abstract
The ability to sense, localize, and estimate the 3D position and orientation of the human body is critical in virtual reality (VR) and extended reality (XR) applications. This becomes more important and challenging with the deployment of VR/XR applications over the next generation of wireless systems such as 5G and beyond. In this paper, we propose a novel framework that can reconstruct the 3D human body pose of the user given sparse measurements from Inertial Measurement Unit (IMU) sensors over a noisy wireless environment. Specifically, our framework enables reliable transmission of compressed IMU signals through noisy wireless channels and effective recovery of such signals at the receiver, e.g., an edge server. This task is very challenging due to the constraints of transmit power, recovery accuracy, and recovery latency. To address these challenges, we first develop a deep generative model at the receiver to recover the data from linear measurements of IMU signals. The linear measurements of the IMU signals are obtained by a linear projection with a measurement matrix based on the compressive sensing theory. The key to the success of our framework lies in the novel design of the measurement matrix at the transmitter, which can not only satisfy power constraints for the IMU devices but also obtain a highly accurate recovery for the IMU signals at the receiver. This can be achieved by extending the set-restricted eigenvalue condition of the measurement matrix and combining it with an upper bound for the power transmission constraint. Our framework can achieve robust performance for recovering 3D human poses from noisy compressed IMU signals. Additionally, our pre-trained deep generative model achieves signal reconstruction accuracy comparable to an optimization-based approach, i.e., Lasso, but is an order of magnitude faster.
- Published
- 2023
22. Sample-Driven Federated Learning for Energy-Efficient and Real-Time IoT Sensing
- Author
-
Luu, Minh Ngoc, Nguyen, Minh-Duong, Bedeer, Ebrahim, Nguyen, Van Duc, Hoang, Dinh Thai, Nguyen, Diep N., and Pham, Quoc-Viet
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence ,I.2.11 - Abstract
In the domain of Federated Learning (FL) systems, recent cutting-edge methods heavily rely on ideal conditions convergence analysis. Specifically, these approaches assume that the training datasets on IoT devices possess similar attributes to the global data distribution. However, this approach fails to capture the full spectrum of data characteristics in real-time sensing FL systems. In order to overcome this limitation, we suggest a new approach system specifically designed for IoT networks with real-time sensing capabilities. Our approach takes into account the generalization gap due to the user's data sampling process. By effectively controlling this sampling process, we can mitigate the overfitting issue and improve overall accuracy. In particular, We first formulate an optimization problem that harnesses the sampling process to concurrently reduce overfitting while maximizing accuracy. In pursuit of this objective, our surrogate optimization problem is adept at handling energy efficiency while optimizing the accuracy with high generalization. To solve the optimization problem with high complexity, we introduce an online reinforcement learning algorithm, named Sample-driven Control for Federated Learning (SCFL) built on the Soft Actor-Critic (A2C) framework. This enables the agent to dynamically adapt and find the global optima even in changing environments. By leveraging the capabilities of SCFL, our system offers a promising solution for resource allocation in FL systems with real-time sensing capabilities., Comment: 17 pages, 5 figures
- Published
- 2023
23. A Human-Centric Metaverse Enabled by Brain-Computer Interface: A Survey
- Author
-
Zhu, Howe Yuan, Hieu, Nguyen Quang, Hoang, Dinh Thai, Nguyen, Diep N., and Lin, Chin-Teng
- Subjects
Computer Science - Human-Computer Interaction - Abstract
The growing interest in the Metaverse has generated momentum for members of academia and industry to innovate toward realizing the Metaverse world. The Metaverse is a unique, continuous, and shared virtual world where humans embody a digital form within an online platform. Through a digital avatar, Metaverse users should have a perceptual presence within the environment and can interact and control the virtual world around them. Thus, a human-centric design is a crucial element of the Metaverse. The human users are not only the central entity but also the source of multi-sensory data that can be used to enrich the Metaverse ecosystem. In this survey, we study the potential applications of Brain-Computer Interface (BCI) technologies that can enhance the experience of Metaverse users. By directly communicating with the human brain, the most complex organ in the human body, BCI technologies hold the potential for the most intuitive human-machine system operating at the speed of thought. BCI technologies can enable various innovative applications for the Metaverse through this neural pathway, such as user cognitive state monitoring, digital avatar control, virtual interactions, and imagined speech communications. This survey first outlines the fundamental background of the Metaverse and BCI technologies. We then discuss the current challenges of the Metaverse that can potentially be addressed by BCI, such as motion sickness when users experience virtual environments or the negative emotional states of users in immersive virtual applications. After that, we propose and discuss a new research direction called Human Digital Twin, in which digital twins can create an intelligent and interactable avatar from the user's brain signals. We also present the challenges and potential solutions in synchronizing and communicating between virtual and physical entities in the Metaverse.
- Published
- 2023
24. Unraveling reproductive and maternal health challenges of women living with HIV/AIDS in Vietnam: a qualitative study
- Author
-
Nguyen, Lynn T, Minh Giang, Le, Nguyen, Diep B, Nguyen, Trang T, and Lin, Chunqing
- Subjects
Biomedical and Clinical Sciences ,Midwifery ,Public Health ,Health Sciences ,Reproductive Medicine ,Clinical Research ,Behavioral and Social Science ,HIV/AIDS ,Contraception/Reproduction ,Pediatric ,Health Services ,8.1 Organisation and delivery of services ,Health and social care services research ,Reproductive health and childbirth ,Infection ,Good Health and Well Being ,Pregnancy ,Humans ,Female ,Infant ,Newborn ,Acquired Immunodeficiency Syndrome ,HIV ,Maternal Health ,Vietnam ,HIV Infections ,Qualitative Research ,Women ,Stigma ,Maternal care ,Reproductive health ,Paediatrics and Reproductive Medicine ,Obstetrics & Reproductive Medicine ,Reproductive medicine ,Public health - Abstract
BackgroundHuman Immunodeficiency Virus (HIV) remains a significant public health concern worldwide. Women living with HIV/AIDS (WLHA) have the additional and unique need to seek sexual and reproductive health services. WLHA's maternal health journeys can be shaped by the cultural norms and resources that exist in their society. This study sought to understand if and how WLHA's family planning, pregnancy, and motherhood experiences could be influenced by the patriarchal culture, gender roles, and HIV stigma in Vietnam, specifically.MethodsBetween December 2021 and March 2022, 30 WLHA with diverse socioeconomic backgrounds and childbirth experiences were interviewed in Hanoi, Vietnam. These semi-structured interviews covered topics including HIV stigma, gender norms, pregnancy experiences, and child-rearing challenges. Interviews were audio recorded, transcribed, and analysed using ATLAS.ti.ResultsQualitative analyses of participant quotes revealed how limited information on one's health prospects and reproductive options posed a significant challenge to family planning. Societal and familial expectations as well as economic circumstances also influenced reproductive decision-making. WLHA often encountered substandard healthcare during pregnancy, labor, and delivery. Stigma and lack of provider attentiveness resulted in cases where women were denied pain relief and other medical services. Communication breakdowns resulted in failure to administer antiretroviral therapy for newborns. Motherhood for WLHA was shadowed by concerns for not only their own health, but also the wellbeing of their children, as HIV stigma affected their children at school and in society as well. Many WLHA highlighted the constructive or destructive role that family members could play in their childbirth decision-making and care-giving experiences.ConclusionsOverall, this study underscores the complex ways that cultural expectations, family support, and stigma in healthcare impact WLHA. Efforts to educate and engage families and healthcare providers are warranted to better understand and address the needs of WLHA, ultimately improving their reproductive and maternal health.
- Published
- 2024
25. Detection and mitigation of soil salinization risk from saline/brackish water aquaculture in coastal areas: an application of remote sensing and managed aquifer recharge
- Author
-
Nguyen, Diep Ngoc, Chiapponi, Emilia, Nguyen, Dong Minh, Antonellini, Marco, and Silvestri, Sonia
- Published
- 2024
- Full Text
- View/download PDF
26. Collaborative Learning Framework to Detect Attacks in Transactions and Smart Contracts
- Author
-
Khoa, Tran Viet, Son, Do Hai, Nguyen, Chi-Hieu, Hoang, Dinh Thai, Nguyen, Diep N., Quynh, Tran Thi Thuy, Hoang, Trong-Minh, Ha, Nguyen Viet, Dutkiewicz, Eryk, Alsheikh, Abu, and Trung, Nguyen Linh
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Distributed, Parallel, and Cluster Computing - Abstract
With the escalating prevalence of malicious activities exploiting vulnerabilities in blockchain systems, there is an urgent requirement for robust attack detection mechanisms. To address this challenge, this paper presents a novel collaborative learning framework designed to detect attacks in blockchain transactions and smart contracts by analyzing transaction features. Our framework exhibits the capability to classify various types of blockchain attacks, including intricate attacks at the machine code level (e.g., injecting malicious codes to withdraw coins from users unlawfully), which typically necessitate significant time and security expertise to detect. To achieve that, the proposed framework incorporates a unique tool that transforms transaction features into visual representations, facilitating efficient analysis and classification of low-level machine codes. Furthermore, we propose an advanced collaborative learning model to enable real-time detection of diverse attack types at distributed mining nodes. Our model can efficiently detect attacks in smart contracts and transactions for blockchain systems without the need to gather all data from mining nodes into a centralized server. In order to evaluate the performance of our proposed framework, we deploy a pilot system based on a private Ethereum network and conduct multiple attack scenarios to generate a novel dataset. To the best of our knowledge, our dataset is the most comprehensive and diverse collection of transactions and smart contracts synthesized in a laboratory for cyberattack detection in blockchain systems. Our framework achieves a detection accuracy of approximately 94% through extensive simulations and 91% in real-time experiments with a throughput of over 2,150 transactions per second.
- Published
- 2023
27. Wirelessly Powered Federated Learning Networks: Joint Power Transfer, Data Sensing, Model Training, and Resource Allocation
- Author
-
Le, Mai, Hoang, Dinh Thai, Nguyen, Diep N., Hwang, Won-Joo, and Pham, Quoc-Viet
- Subjects
Computer Science - Networking and Internet Architecture ,Computer Science - Artificial Intelligence - Abstract
Federated learning (FL) has found many successes in wireless networks; however, the implementation of FL has been hindered by the energy limitation of mobile devices (MDs) and the availability of training data at MDs. How to integrate wireless power transfer and mobile crowdsensing towards sustainable FL solutions is a research topic entirely missing from the open literature. This work for the first time investigates a resource allocation problem in collaborative sensing-assisted sustainable FL (S2FL) networks with the goal of minimizing the total completion time. We investigate a practical harvesting-sensing-training-transmitting protocol in which energy-limited MDs first harvest energy from RF signals, use it to gain a reward for user participation, sense the training data from the environment, train the local models at MDs, and transmit the model updates to the server. The total completion time minimization problem of jointly optimizing power transfer, transmit power allocation, data sensing, bandwidth allocation, local model training, and data transmission is complicated due to the non-convex objective function, highly non-convex constraints, and strongly coupled variables. We propose a computationally-efficient path-following algorithm to obtain the optimal solution via the decomposition technique. In particular, inner convex approximations are developed for the resource allocation subproblem, and the subproblems are performed alternatively in an iterative fashion. Simulation results are provided to evaluate the effectiveness of the proposed S2FL algorithm in reducing the completion time up to 21.45% in comparison with other benchmark schemes. Further, we investigate an extension of our work from frequency division multiple access (FDMA) to non-orthogonal multiple access (NOMA) and show that NOMA can speed up the total completion time 8.36% on average of the considered FL system.
- Published
- 2023
28. Countering Eavesdroppers with Meta-learning-based Cooperative Ambient Backscatter Communications
- Author
-
Chu, Nam H., Van Huynh, Nguyen, Nguyen, Diep N., Hoang, Dinh Thai, Gong, Shimin, Shu, Tao, Dutkiewicz, Eryk, and Phan, Khoa T.
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
This article introduces a novel lightweight framework using ambient backscattering communications to counter eavesdroppers. In particular, our framework divides an original message into two parts: (i) the active-transmit message transmitted by the transmitter using conventional RF signals and (ii) the backscatter message transmitted by an ambient backscatter tag that backscatters upon the active signals emitted by the transmitter. Notably, the backscatter tag does not generate its own signal, making it difficult for an eavesdropper to detect the backscattered signals unless they have prior knowledge of the system. Here, we assume that without decoding/knowing the backscatter message, the eavesdropper is unable to decode the original message. Even in scenarios where the eavesdropper can capture both messages, reconstructing the original message is a complex task without understanding the intricacies of the message-splitting mechanism. A challenge in our proposed framework is to effectively decode the backscattered signals at the receiver, often accomplished using the maximum likelihood (MLK) approach. However, such a method may require a complex mathematical model together with perfect channel state information (CSI). To address this issue, we develop a novel deep meta-learning-based signal detector that can not only effectively decode the weak backscattered signals without requiring perfect CSI but also quickly adapt to a new wireless environment with very little knowledge. Simulation results show that our proposed learning approach, without requiring perfect CSI and complex mathematical model, can achieve a bit error ratio close to that of the MLK-based approach. They also clearly show the efficiency of the proposed approach in dealing with eavesdropping attacks and the lack of training data for deep learning models in practical scenarios.
- Published
- 2023
29. MetaShard: A Novel Sharding Blockchain Platform for Metaverse Applications
- Author
-
Nguyen, Cong T., Hoang, Dinh Thai, Nguyen, Diep N., Xiao, Yong, Niyato, Dusit, and Dutkiewicz, Eryk
- Subjects
Computer Science - Cryptography and Security - Abstract
Due to its security, transparency, and flexibility in verifying virtual assets, blockchain has been identified as one of the key technologies for Metaverse. Unfortunately, blockchain-based Metaverse faces serious challenges such as massive resource demands, scalability, and security concerns. To address these issues, this paper proposes a novel sharding-based blockchain framework, namely MetaShard, for Metaverse applications. Particularly, we first develop an effective consensus mechanism, namely Proof-of-Engagement, that can incentivize MUs' data and computing resource contribution. Moreover, to improve the scalability of MetaShard, we propose an innovative sharding management scheme to maximize the network's throughput while protecting the shards from 51% attacks. Since the optimization problem is NP-complete, we develop a hybrid approach that decomposes the problem (using the binary search method) into sub-problems that can be solved effectively by the Lagrangian method. As a result, the proposed approach can obtain solutions in polynomial time, thereby enabling flexible shard reconfiguration and reducing the risk of corruption from the adversary. Extensive numerical experiments show that, compared to the state-of-the-art commercial solvers, our proposed approach can achieve up to 66.6% higher throughput in less than 1/30 running time. Moreover, the proposed approach can achieve global optimal solutions in most experiments.
- Published
- 2023
30. Enhancing Immersion and Presence in the Metaverse with Over-the-Air Brain-Computer Interface
- Author
-
Hieu, Nguyen Quang, Hoang, Dinh Thai, Nguyen, Diep N., Nguyen, Van-Dinh, Xiao, Yong, and Dutkiewicz, Eryk
- Subjects
Computer Science - Human-Computer Interaction - Abstract
This article proposes a novel framework that utilizes an over-the-air Brain-Computer Interface (BCI) to learn Metaverse users' expectations. By interpreting users' brain activities, our framework can optimize physical resources and enhance Quality-of-Experience (QoE) for users. To achieve this, we leverage a Wireless Edge Server (WES) to process electroencephalography (EEG) signals via uplink wireless channels, thus eliminating the computational burden for Metaverse users' devices. As a result, the WES can learn human behaviors, adapt system configurations, and allocate radio resources to tailor personalized user settings. Despite the potential of BCI, the inherent noisy wireless channels and uncertainty of the EEG signals make the related resource allocation and learning problems especially challenging. We formulate the joint learning and resource allocation problem as a mixed integer programming problem. Our solution involves two algorithms: a hybrid learning algorithm and a meta-learning algorithm. The hybrid learning algorithm can effectively find the solution for the formulated problem. Specifically, the meta-learning algorithm can further exploit the neurodiversity of the EEG signals across multiple users, leading to higher classification accuracy. Extensive simulation results with real-world BCI datasets show the effectiveness of our framework with low latency and high EEG signal classification accuracy., Comment: arXiv admin note: text overlap with arXiv:2212.08811
- Published
- 2023
31. Networking community health workers for service integration: role of social media
- Author
-
Li, Li, Lin, Chunqing, Pham, Loc Quang, Nguyen, Diep Bich, and Le, Tuan Anh
- Subjects
Public Health ,Social Work ,Health Sciences ,Human Society ,Health Services ,HIV/AIDS ,Behavioral and Social Science ,Clinical Research ,Basic Behavioral and Social Science ,8.1 Organisation and delivery of services ,Health and social care services research ,Humans ,Social Media ,Community Health Workers ,HIV Infections ,Vietnam ,Communication ,Networking ,community health worker ,service integration ,social media ,Public Health and Health Services ,Psychology ,Public health ,Sociology ,Clinical and health psychology - Abstract
Community health workers (CHW) can play an active role in providing integrated HIV and harm reduction services. We used social media to create a virtual network among Vietnamese CHW. This paper reports CHW's social media engagement and the relationships with other work-related indicators. Sixty CHW participated in an intervention for integrated HIV/drug use service delivery. Following two in-person sessions, Facebook groups were established for CHW to share information, seek consultation, and refer patients. CHW's levels of online engagements were tracked for six months and linked to their service provision confidence, interaction with patients and other providers, and job satisfaction. The CHW made 181 posts, which received 557 comments and 1,607 reactions during the six months. Among the 60 CHW, 22 (36.6%) had three or more posts, 19 (31.7%) had one or two posts, and 19 (31.7%) had no post. Comparing the baseline and 6-month follow-up data, we observed that those who posted three or more times showed better service provision confidence (p = 0.0081), more interaction with providers in other settings (p = 0.0071), and higher job satisfaction (p = 0.0268). Our study suggests using social media to engage CHW in virtual communications to improve service provision in communities.
- Published
- 2023
32. Dynamic Resource Allocation for Metaverse Applications with Deep Reinforcement Learning
- Author
-
Chu, Nam H., Nguyen, Diep N., Hoang, Dinh Thai, Phan, Khoa T., Dutkiewicz, Eryk, Niyato, Dusit, and Shu, Tao
- Subjects
Computer Science - Networking and Internet Architecture ,Computer Science - Distributed, Parallel, and Cluster Computing ,Computer Science - Machine Learning - Abstract
This work proposes a novel framework to dynamically and effectively manage and allocate different types of resources for Metaverse applications, which are forecasted to demand massive resources of various types that have never been seen before. Specifically, by studying functions of Metaverse applications, we first propose an effective solution to divide applications into groups, namely MetaInstances, where common functions can be shared among applications to enhance resource usage efficiency. Then, to capture the real-time, dynamic, and uncertain characteristics of request arrival and application departure processes, we develop a semi-Markov decision process-based framework and propose an intelligent algorithm that can gradually learn the optimal admission policy to maximize the revenue and resource usage efficiency for the Metaverse service provider and at the same time enhance the Quality-of-Service for Metaverse users. Extensive simulation results show that our proposed approach can achieve up to 120% greater revenue for the Metaverse service providers and up to 178.9% higher acceptance probability for Metaverse application requests than those of other baselines., Comment: To be published in the Proceedings of the IEEE WCNC 2023
- Published
- 2023
33. Network-Aided Intelligent Traffic Steering in 6G O-RAN: A Multi-Layer Optimization Framework
- Author
-
Nguyen, Van-Dinh, Vu, Thang X., Nguyen, Nhan Thanh, Nguyen, Dinh C., Juntti, Markku, Luong, Nguyen Cong, Hoang, Dinh Thai, Nguyen, Diep N., and Chatzinotas, Symeon
- Subjects
Computer Science - Machine Learning ,Electrical Engineering and Systems Science - Systems and Control - Abstract
To enable an intelligent, programmable and multi-vendor radio access network (RAN) for 6G networks, considerable efforts have been made in standardization and development of open RAN (O-RAN). So far, however, the applicability of O-RAN in controlling and optimizing RAN functions has not been widely investigated. In this paper, we jointly optimize the flow-split distribution, congestion control and scheduling (JFCS) to enable an intelligent traffic steering application in O-RAN. Combining tools from network utility maximization and stochastic optimization, we introduce a multi-layer optimization framework that provides fast convergence, long-term utility-optimality and significant delay reduction compared to the state-of-the-art and baseline RAN approaches. Our main contributions are three-fold: i) we propose the novel JFCS framework to efficiently and adaptively direct traffic to appropriate radio units; ii) we develop low-complexity algorithms based on the reinforcement learning, inner approximation and bisection search methods to effectively solve the JFCS problem in different time scales; and iii) the rigorous theoretical performance results are analyzed to show that there exists a scaling factor to improve the tradeoff between delay and utility-optimization. Collectively, the insights in this work will open the door towards fully automated networks with enhanced control and flexibility. Numerical results are provided to demonstrate the effectiveness of the proposed algorithms in terms of the convergence rate, long-term utility-optimality and delay reduction., Comment: 15 pages, 10 figures. A short version will be submitted to IEEE GLOBECOM 2023
- Published
- 2023
34. Distributed Traffic Synthesis and Classification in Edge Networks: A Federated Self-supervised Learning Approach
- Author
-
Xiao, Yong, Xia, Rong, Li, Yingyu, Shi, Guangming, Nguyen, Diep N., Hoang, Dinh Thai, Niyato, Dusit, and Krunz, Marwan
- Subjects
Computer Science - Machine Learning ,Computer Science - Distributed, Parallel, and Cluster Computing ,Computer Science - Networking and Internet Architecture - Abstract
With the rising demand for wireless services and increased awareness of the need for data protection, existing network traffic analysis and management architectures are facing unprecedented challenges in classifying and synthesizing the increasingly diverse services and applications. This paper proposes FS-GAN, a federated self-supervised learning framework to support automatic traffic analysis and synthesis over a large number of heterogeneous datasets. FS-GAN is composed of multiple distributed Generative Adversarial Networks (GANs), with a set of generators, each being designed to generate synthesized data samples following the distribution of an individual service traffic, and each discriminator being trained to differentiate the synthesized data samples and the real data samples of a local dataset. A federated learning-based framework is adopted to coordinate local model training processes of different GANs across different datasets. FS-GAN can classify data of unknown types of service and create synthetic samples that capture the traffic distribution of the unknown types. We prove that FS-GAN can minimize the Jensen-Shannon Divergence (JSD) between the distribution of real data across all the datasets and that of the synthesized data samples. FS-GAN also maximizes the JSD among the distributions of data samples created by different generators, resulting in each generator producing synthetic data samples that follow the same distribution as one particular service type. Extensive simulation results show that the classification accuracy of FS-GAN achieves over 20% improvement in average compared to the state-of-the-art clustering-based traffic analysis algorithms. FS-GAN also has the capability to synthesize highly complex mixtures of traffic types without requiring any human-labeled data samples., Comment: published as early access at IEEE Transactions on Mobile Computing, January 2023
- Published
- 2023
- Full Text
- View/download PDF
35. Time-sensitive Learning for Heterogeneous Federated Edge Intelligence
- Author
-
Xiao, Yong, Zhang, Xiaohan, Shi, Guangming, Krunz, Marwan, Nguyen, Diep N., and Hoang, Dinh Thai
- Subjects
Computer Science - Machine Learning ,Computer Science - Networking and Internet Architecture - Abstract
Real-time machine learning has recently attracted significant interest due to its potential to support instantaneous learning, adaptation, and decision making in a wide range of application domains, including self-driving vehicles, intelligent transportation, and industry automation. We investigate real-time ML in a federated edge intelligence (FEI) system, an edge computing system that implements federated learning (FL) solutions based on data samples collected and uploaded from decentralized data networks. FEI systems often exhibit heterogenous communication and computational resource distribution, as well as non-i.i.d. data samples, resulting in long model training time and inefficient resource utilization. Motivated by this fact, we propose a time-sensitive federated learning (TS-FL) framework to minimize the overall run-time for collaboratively training a shared ML model. Training acceleration solutions for both TS-FL with synchronous coordination (TS-FL-SC) and asynchronous coordination (TS-FL-ASC) are investigated. To address straggler effect in TS-FL-SC, we develop an analytical solution to characterize the impact of selecting different subsets of edge servers on the overall model training time. A server dropping-based solution is proposed to allow slow-performance edge servers to be removed from participating in model training if their impact on the resulting model accuracy is limited. A joint optimization algorithm is proposed to minimize the overall time consumption of model training by selecting participating edge servers, local epoch number. We develop an analytical expression to characterize the impact of staleness effect of asynchronous coordination and straggler effect of FL on the time consumption of TS-FL-ASC. Experimental results show that TS-FL-SC and TS-FL-ASC can provide up to 63% and 28% of reduction, in the overall model training time, respectively., Comment: IEEE Link: https://ieeexplore.ieee.org/document/10018200
- Published
- 2023
- Full Text
- View/download PDF
36. Summarizing Proof-of-Stake mechanisms and their practical deployments: applications, attacks, solutions, and future directions
- Author
-
Nguyen, Cong T., primary, Hoang, Dinh Thai, additional, Nguyen, Diep N., additional, Nguyen, Van-Dinh, additional, and Dutkiewicz, Eryk, additional
- Published
- 2024
- Full Text
- View/download PDF
37. Toward BCI-enabled Metaverse: A Joint Learning and Resource Allocation Approach
- Author
-
Hieu, Nguyen Quang, Hoang, Dinh Thai, Nguyen, Diep N., and Dutkiewicz, Eryk
- Subjects
Electrical Engineering and Systems Science - Signal Processing ,Computer Science - Networking and Internet Architecture - Abstract
Toward user-driven Metaverse applications with fast wireless connectivity and tremendous computing demand through future 6G infrastructures, we propose a Brain-Computer Interface (BCI) enabled framework that paves the way for the creation of intelligent human-like avatars. Our approach takes a first step toward the Metaverse systems in which the digital avatars are envisioned to be more intelligent by collecting and analyzing brain signals through cellular networks. In our proposed system, Metaverse users experience Metaverse applications while sending their brain signals via uplink wireless channels in order to create intelligent human-like avatars at the base station. As such, the digital avatars can not only give useful recommendations for the users but also enable the system to create user-driven applications. Our proposed framework involves a mixed decision-making and classification problem in which the base station has to allocate its computing and radio resources to the users and classify the brain signals of users in an efficient manner. To this end, we propose a hybrid training algorithm that utilizes recent advances in deep reinforcement learning to address the problem. Specifically, our hybrid training algorithm contains three deep neural networks cooperating with each other to enable better realization of the mixed decision-making and classification problem. Simulation results show that our proposed framework can jointly address resource allocation for the system and classify brain signals of the users with highly accurate predictions.
- Published
- 2022
38. Virtual Reality as a Tool for Destination Marketing of Sustainable Tourism During the COVID-19 Pandemic
- Author
-
Hoang, Sinh Duc, Nguyen, Diep T. N., Pham, Minh, Tung, Le Thanh, editor, Sinh, Nguyen Hoang, editor, and Ha, Pham, editor
- Published
- 2024
- Full Text
- View/download PDF
39. Modeling Bio-Impedance Measurement in a Reconstructed Model From MRI Images for Developing Electrical Impedance Tomography Application
- Author
-
Nguyen Diep, Quoc Tuan, Nguyen, Hoang Nam, Truong, Tich Thien, Tran, Trung Nghia, Magjarević, Ratko, Series Editor, Ładyżyński, Piotr, Associate Editor, Ibrahim, Fatimah, Associate Editor, Lackovic, Igor, Associate Editor, Rock, Emilio Sacristan, Associate Editor, Vo, Van Toi, editor, Nguyen, Thi-Hiep, editor, Vong, Binh Long, editor, Le, Ngoc Bich, editor, and Nguyen, Thanh Qua, editor
- Published
- 2024
- Full Text
- View/download PDF
40. English-Medium-Instruction in Vietnamese Universities: Pitfalls, Accomplishments, and Impact on Graduate Employability
- Author
-
Phan, Huong Le Thanh, Nguyen, Diep Thi Bich, Phung, Duc Thi, Le Ha, Phan, Series Editor, Kelley, Liam C., Series Editor, Nghia, Tran Le Huu, editor, Tran, Ly Thi, editor, and Ngo, Mai Tuyet, editor
- Published
- 2024
- Full Text
- View/download PDF
41. Challenges of methadone maintenance treatment decentralisation from Vietnamese primary care providers' perspectives
- Author
-
Nguyen, Diep Bich, Nguyen, Trang Thu, Lin, Chunqing, Dinh, Thuy Thi Thanh, Le, Giang Minh, and Li, Li
- Subjects
Health Services and Systems ,Health Sciences ,Clinical Research ,HIV/AIDS ,Health Services ,Health and social care services research ,8.1 Organisation and delivery of services ,Good Health and Well Being ,Humans ,Methadone ,Opiate Substitution Treatment ,Politics ,Primary Health Care ,Vietnam ,decentralisation ,methadone maintenance treatment ,opioid use disorder ,primary care providers ,Medical and Health Sciences ,Studies in Human Society ,Psychology and Cognitive Sciences ,Substance Abuse ,Health sciences ,Human society ,Psychology - Abstract
IntroductionDecentralising methadone maintenance treatment to primary care improves patients' access to care and their drug and HIV treatment outcomes. However, primary care providers (PCP), especially those working in limited-resource settings, are facing great challenges to provide quality methadone treatment. This study explores the challenges perceived by PCP providing methadone treatment at commune health centres in a mountainous region in Vietnam.MethodWe conducted in-depth interviews with 26 PCP who worked as program managers, physicians, counsellors, pharmacists and medication dispensing staff at the methadone programs of eight commune health centres in Dien Bien, Vietnam, in November and December 2019. We used the health-care system framework in developing the interview guides and in summarising data themes.ResultsParticipants identified major challenges in providing methadone treatment in commune health centres at the individual, clinic and environmental levels. Individual-level challenges included a lack of confidence and motivation in providing methadone treatment. Clinic-level factors included inadequate human resources, lack of institutional support, insufficient technical support, lack of referral resources and additional support for patients. Environment-level factors comprised a lack of reasonable policies on financial support for providers at commune health centres for providing methadone treatment, lack of regulations and mechanisms to ensure providers' safety in case of potential violence by patients and to share responsibility for overdose during treatment.Discussion and conclusionPCP in Vietnam faced multi-level challenges in providing quality methadone treatment. Supportive policies and additional resources are needed to ensure the effectiveness of the decentralisation program.
- Published
- 2023
42. Optimal Privacy Preserving for Federated Learning in Mobile Edge Computing
- Author
-
Nguyen, Hai M., Chu, Nam H., Nguyen, Diep N., Hoang, Dinh Thai, Nguyen, Van-Dinh, Ha, Minh Hoang, Dutkiewicz, Eryk, and Krunz, Marwan
- Subjects
Computer Science - Machine Learning ,Computer Science - Cryptography and Security ,Computer Science - Distributed, Parallel, and Cluster Computing - Abstract
Federated Learning (FL) with quantization and deliberately added noise over wireless networks is a promising approach to preserve user differential privacy (DP) while reducing wireless resources. Specifically, an FL process can be fused with quantized Binomial mechanism-based updates contributed by multiple users. However, optimizing quantization parameters, communication resources (e.g., transmit power, bandwidth, and quantization bits), and the added noise to guarantee the DP requirement and performance of the learned FL model remains an open and challenging problem. This article aims to jointly optimize the quantization and Binomial mechanism parameters and communication resources to maximize the convergence rate under the constraints of the wireless network and DP requirement. To that end, we first derive a novel DP budget estimation of the FL with quantization/noise that is tighter than the state-of-the-art bound. We then provide a theoretical bound on the convergence rate. This theoretical bound is decomposed into two components, including the variance of the global gradient and the quadratic bias that can be minimized by optimizing the communication resources, and quantization/noise parameters. The resulting optimization turns out to be a Mixed-Integer Non-linear Programming (MINLP) problem. To tackle it, we first transform this MINLP problem into a new problem whose solutions are proved to be the optimal solutions of the original one. We then propose an approximate algorithm to solve the transformed problem with an arbitrary relative error guarantee. Extensive simulations show that under the same wireless resource constraints and DP protection requirements, the proposed approximate algorithm achieves an accuracy close to the accuracy of the conventional FL without quantization/noise. The results can achieve a higher convergence rate while preserving users' privacy., Comment: 16 pages, 10 figures
- Published
- 2022
43. Label driven Knowledge Distillation for Federated Learning with non-IID Data
- Author
-
Nguyen, Minh-Duong, Pham, Quoc-Viet, Hoang, Dinh Thai, Tran-Thanh, Long, Nguyen, Diep N., and Hwang, Won-Joo
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence ,19A22 ,I.2.11 - Abstract
In real-world applications, Federated Learning (FL) meets two challenges: (1) scalability, especially when applied to massive IoT networks; and (2) how to be robust against an environment with heterogeneous data. Realizing the first problem, we aim to design a novel FL framework named Full-stack FL (F2L). More specifically, F2L utilizes a hierarchical network architecture, making extending the FL network accessible without reconstructing the whole network system. Moreover, leveraging the advantages of hierarchical network design, we propose a new label-driven knowledge distillation (LKD) technique at the global server to address the second problem. As opposed to current knowledge distillation techniques, LKD is capable of training a student model, which consists of good knowledge from all teachers' models. Therefore, our proposed algorithm can effectively extract the knowledge of the regions' data distribution (i.e., the regional aggregated models) to reduce the divergence between clients' models when operating under the FL system with non-independent identically distributed data. Extensive experiment results reveal that: (i) our F2L method can significantly improve the overall FL efficiency in all global distillations, and (ii) F2L rapidly achieves convergence as global distillation stages occur instead of increasing on each communication cycle., Comment: 28 pages, 5 figures, 10 tables
- Published
- 2022
44. Benefits, harms and cost-effectiveness of cervical screening, triage and treatment strategies for women in the general population
- Author
-
Simms, Kate T., Keane, Adam, Nguyen, Diep Thi Ngoc, Caruana, Michael, Hall, Michaela T., Lui, Gigi, Gauvreau, Cindy, Demke, Owen, Arbyn, Marc, Basu, Partha, Wentzensen, Nicolas, Lauby-Secretan, Beatrice, Ilbawi, Andre, Hutubessy, Raymond, Almonte, Maribel, De Sanjosé, Silvia, Kelly, Helen, Dalal, Shona, Eckert, Linda O., Santesso, Nancy, Broutet, Nathalie, and Canfell, Karen
- Published
- 2023
- Full Text
- View/download PDF
45. Benefits and harms of cervical screening, triage and treatment strategies in women living with HIV
- Author
-
Hall, Michaela T., Simms, Kate T., Murray, John M., Keane, Adam, Nguyen, Diep T. N., Caruana, Michael, Lui, Gigi, Kelly, Helen, Eckert, Linda O., Santesso, Nancy, de Sanjose, Silvia, Swai, Edwin E., Rangaraj, Ajay, Owiredu, Morkor Newman, Gauvreau, Cindy, Demke, Owen, Basu, Partha, Arbyn, Marc, Dalal, Shona, Broutet, Nathalie, and Canfell, Karen
- Published
- 2023
- Full Text
- View/download PDF
46. When Virtual Reality Meets Rate Splitting Multiple Access: A Joint Communication and Computation Approach
- Author
-
Hieu, Nguyen Quang, Nguyen, Diep N., Hoang, Dinh Thai, and Dutkiewicz, Eryk
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
Rate Splitting Multiple Access (RSMA) has emerged as an effective interference management scheme for applications that require high data rates. Although RSMA has shown advantages in rate enhancement and spectral efficiency, it has yet not to be ready for latency-sensitive applications such as virtual reality streaming, which is an essential building block of future 6G networks. Unlike conventional High-Definition streaming applications, streaming virtual reality applications requires not only stringent latency requirements but also the computation capability of the transmitter to quickly respond to dynamic users' demands. Thus, conventional RSMA approaches usually fail to address the challenges caused by computational demands at the transmitter, let alone the dynamic nature of the virtual reality streaming applications. To overcome the aforementioned challenges, we first formulate the virtual reality streaming problem assisted by RSMA as a joint communication and computation optimization problem. A novel multicast approach is then proposed to cluster users into different groups based on a Field-of-View metric and transmit multicast streams in a hierarchical manner. After that, we propose a deep reinforcement learning approach to obtain the solution for the optimization problem. Extensive simulations show that our framework can achieve the millisecond-latency requirement, which is much lower than other baseline schemes.
- Published
- 2022
- Full Text
- View/download PDF
47. COVID-19, Geopolitics and Risk Management: Towards Framing a Reciprocal, Coordinated, Responsive and Empathetic International Education Sector
- Author
-
Tran, Ly Thi, Nguyen, Diep Thi Bich, Blackmore, Jill, He, Baogang, and Vu, Huy Quan
- Abstract
Geopolitics is shaping the international education landscape. International education has trationally been used as a tool to boost transnational cooperation, foster multilateral and global ties, and reduce tensions between nations. Such a role has been eroded and international education has been weaponised in the context of escalating political turbulences and disputes over the COVID-19 pandemic. In particular, the relationship between Australia and China, with international student flows interrupted due to COVID-19, is overshadowed by escalating geopolitical tensions in the Indo-Pacific region. Based on a qualitative study, this article examines stakeholders' views on the responses of the Australian international education sector and universities to emerging geopolitical tensions. The conjuncture of geopolitics, COVID-19 and Australia's former government responses magnified a sense of crisis for universities and the international education sector as it was at risk because of their financial reliance on international students. Based on the findings, recommendations are made for the framing of a reciprocal, coordinated, responsive and empathetic international education sector to mitigate geopolitical risks and ensure more sustainable and ethical development for the sector.
- Published
- 2023
- Full Text
- View/download PDF
48. MetaSlicing: A Novel Resource Allocation Framework for Metaverse
- Author
-
Chu, Nam H., Hoang, Dinh Thai, Nguyen, Diep N., Phan, Khoa T., Dutkiewicz, Eryk, Niyato, Dusit, and Shu, Tao
- Subjects
Computer Science - Networking and Internet Architecture ,Computer Science - Distributed, Parallel, and Cluster Computing - Abstract
Creating and maintaining the Metaverse requires enormous resources that have never been seen before, especially computing resources for intensive data processing to support the Extended Reality, enormous storage resources, and massive networking resources for maintaining ultra high-speed and low-latency connections. Therefore, this work aims to propose a novel framework, namely MetaSlicing, that can provide a highly effective and comprehensive solution in managing and allocating different types of resources for Metaverse applications. In particular, by observing that Metaverse applications may have common functions, we first propose grouping applications into clusters, called MetaInstances. In a MetaInstance, common functions can be shared among applications. As such, the same resources can be used by multiple applications simultaneously, thereby enhancing resource utilization dramatically.To address the real-time characteristic and resource demand's dynamic and uncertainty in the Metaverse, we develop an effective framework based on the semi-Markov decision process and propose an intelligent admission control algorithm that can maximize resource utilization and enhance the Quality-of-Service for end-users. Extensive simulation results show that our proposed solution outperforms the Greedy-based policies by up to 80% and 47% in terms of long-term revenue for Metaverse providers and request acceptance probability, respectively., Comment: Revised figures, fix typos
- Published
- 2022
49. Frequency Hopping Joint Radar-Communications with Hybrid Sub-pulse Frequency and Duration
- Author
-
Hoang, Linh Manh, Zhang, J. Andrew, Nguyen, Diep N., and Hoang, Dinh Thai
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
Frequency-hopping (FH) joint radar-communications (JRC) can offer excellent security for integrated sensing and communication systems. However, existing JRC schemes mainly embed information using only the sub-pulse frequencies and hence the data rate is limited. In this paper, we propose to use both sub-pulse frequencies and durations for information modulation, leading to higher communication data rates. For information demodulation, we propose a novel scheme by using the time-frequency analysis (TFA) technique and a "you only look once" (YOLO)-based detection system. As such, our system does not require channel estimation, simplifying the transmission signal frame design. Simulation results demonstrate the effectiveness of our scheme, and show that it is robust against the Doppler shift and timing offset between the transceiver and the communication receiver., Comment: 5 pages
- Published
- 2022
50. HCFL: A High Compression Approach for Communication-Efficient Federated Learning in Very Large Scale IoT Networks
- Author
-
Nguyen, Minh-Duong, Lee, Sang-Min, Pham, Quoc-Viet, Hoang, Dinh Thai, Nguyen, Diep N., and Hwang, Won-Joo
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence ,Computer Science - Distributed, Parallel, and Cluster Computing ,62D05 68T04 ,I.2 ,E.4 - Abstract
Federated learning (FL) is a new artificial intelligence concept that enables Internet-of-Things (IoT) devices to learn a collaborative model without sending the raw data to centralized nodes for processing. Despite numerous advantages, low computing resources at IoT devices and high communication costs for exchanging model parameters make applications of FL in massive IoT networks very limited. In this work, we develop a novel compression scheme for FL, called high-compression federated learning (HCFL), for very large scale IoT networks. HCFL can reduce the data load for FL processes without changing their structure and hyperparameters. In this way, we not only can significantly reduce communication costs, but also make intensive learning processes more adaptable on low-computing resource IoT devices. Furthermore, we investigate a relationship between the number of IoT devices and the convergence level of the FL model and thereby better assess the quality of the FL process. We demonstrate our HCFL scheme in both simulations and mathematical analyses. Our proposed theoretical research can be used as a minimum level of satisfaction, proving that the FL process can achieve good performance when a determined configuration is met. Therefore, we show that HCFL is applicable in any FL-integrated networks with numerous IoT devices., Comment: 14 pages, 12 figures, 3 tables
- Published
- 2022
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.