LEADER 10935nam 22004933 450 001 9910878994403321 005 20240808080235.0 010 $a3-031-67162-7 035 $a(MiAaPQ)EBC31582823 035 $a(Au-PeEL)EBL31582823 035 $a(CKB)33729296700041 035 $a(EXLCZ)9933729296700041 100 $a20240808d2024 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCommunications and Networking $e18th EAI International Conference, ChinaCom 2023, Sanya, China, November 18-19, 2023, Proceedings 205 $a1st ed. 210 1$aCham :$cSpringer,$d2024. 210 4$d©2024. 215 $a1 online resource (570 pages) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Series ;$vv.590 311 $a3-031-67161-9 327 $aIntro -- Preface -- Organization -- Contents -- Advanced Networking and Optimization Strategies -- Research on Random Access Control Strategy and Optimization Algorithm of Multi-type Terminals Based on Deep Reinforcement Learning -- 1 Introduction -- 2 System Model -- 2.1 Scenario Description -- 2.2 Priority-Based Distributed Queue Random Access Control Strategy -- 3 Problem Description -- 3.1 Delay Model -- 3.2 Energy Consumption Model -- 3.3 Optimization Problem -- 4 Multi-type Terminals Random Access Optimization Algorithm Based on DQN -- 4.1 DQN Algorithm Framework and Neural Network -- 4.2 Basic Flow of Multi-type Terminals Random Access Optimization Algorithm Based on DQN -- 5 Simulation Results -- 6 Conclusion -- References -- A Novel Approach on Semantic Performance Oriented Radio Resource Allocation -- 1 Introduction -- 2 System Model -- 2.1 DeepSC Transmitter -- 2.2 Transmission Model -- 2.3 DeepSC Receiver -- 3 Problem Formulation -- 3.1 Semantic Spectral Efficiency -- 3.2 Problem Formulation -- 3.3 The Optimal Solution -- 4 Simulation Results and Analysis -- 4.1 Compare Method Between Semantic Systems -- 4.2 Compare Method Between Allocation Patterns -- 4.3 Simulation Parameters -- 4.4 Simulation Results -- 5 Conclusion -- References -- A Two-Stage Heuristic SFC Deployment Approach in Software Defined Satellite Networks -- 1 Introduction -- 2 System Model and Problem Formulation -- 2.1 Network Model -- 2.2 SFC Request Model -- 2.3 Problem Formulation -- 3 Two-Stage Heuristic Algorithm -- 3.1 IPSO Algorithm -- 3.2 TEG-Based SFC Routing -- 4 Simulation Results -- 5 Conclusion -- References -- Blockchain-Based Federated Learning with Malicious Attacks in Fog Computing Networks -- 1 Introduction -- 2 System Structure -- 2.1 Network Model -- 2.2 Federated Learning Model -- 3 DAG Blockchain-Based Federated Learning. 327 $a3.1 Reputation and Activity Degree-Based Device Selection Algorithm -- 3.2 Outlier-Based Malicious Model Identification Algorithm -- 3.3 Weighted Federated Learning Aggregation Algorithm -- 3.4 DAG Blockchain-Based Federated Learning Algorithm -- 4 Simulation Results -- 4.1 Simulation Parameters -- 4.2 Baseline Algorithms -- 4.3 Simulation Results and Analysis -- 5 Conclusion -- References -- Target Detection in ISAC System Equipped with IRS: A Joint Active and Passive Beamforming Approach -- 1 Introduction -- 2 System Model and Problem Formulation -- 2.1 System Model -- 2.2 Problem Formulation -- 3 Optimization Algorithm -- 3.1 Optimize wc and wr -- 3.2 Optimize wB -- 3.3 Optimize -- 4 Simulation Results -- 5 Conclusion -- References -- Architecture-Aware Optimization Strategies for Instruction Selection in DSP Compilers -- 1 Introduction -- 2 Related Work -- 3 Optimization Strategies -- 3.1 Instruction Selection Algorithm -- 3.2 Optimized Instruction Selection Algorithm -- 3.3 Optimization in the Examples -- 4 Evaluation -- 4.1 Vector Comparisons and VMOVCV2V -- 4.2 VMAX/VMIN -- 5 Conclusion -- References -- Signal Processing and Communication Optimization -- A Knowledge Graph for UAV Mission Planning Systems -- 1 Introduction -- 2 The Procedures of Building Knowledge Graphs -- 3 The Knowledge Modeling of UAV Mission Planing System -- 4 The Knowledge Exaction of Mission Planing System -- 5 Knowledge Fusion, Representation and Storage -- 6 Proposed GNN-Based Knowledge Reasoning Method -- 6.1 Problem Statement -- 6.2 An Overview of GNN -- 6.3 GNN-Based Entity Classification -- 6.4 GNN-Based Relation Prediction -- 7 Simulations -- 7.1 Pre-process of Data Set -- 7.2 Knowledge Reasoning Results of the Considered UMPS -- 8 Conclusions -- References -- Dynamic Resource Allocation for Network Slicing in LEO Satellite Networks -- 1 Introduction. 327 $a2 Related Work -- 3 System Model and Problem Formulation -- 3.1 Network Model -- 3.2 Terrestrial Traffic Model -- 3.3 Problem Formulation -- 4 Heuristic Algorithm Design -- 4.1 Structure of MMAS-RA -- 4.2 PheromoneUpdating Function -- 5 Simulation -- 5.1 Simulation Settings -- 5.2 Simulation Results -- 6 Conclusion -- References -- Scalable Blockchain-Based Access Control Algorithm for Large-Scale IoT Networks with Byzantine Nodes -- 1 Introduction -- 2 System Model -- 2.1 Proposed Model -- 2.2 XACML -- 2.3 Access Control -- 2.4 Cost Function Optimization-Based Sub-cluster Association Algorithm -- 3 Proposed MRaft Algorithm Based Main Cluster Consensus Scheme -- 3.1 Basic Idea of the Proposed MRaft Algorithm -- 3.2 MRaft Algorithm Procedures -- 4 PBFT-Based Sub-cluster Consensus Algorithm and Main Cluster View Switching -- 4.1 The PBFT-Based Sub-cluster Consensus Phase -- 4.2 The Procedure of View Switching -- 5 Simulations -- 6 Conclusions -- References -- Anti-attack Trust Evaluation Algorithm Based on Bayesian Inference in VANET -- 1 Introduction -- 2 System Model -- 2.1 VANET Message Format -- 2.2 Base Station Side -- 2.3 Vehicle Side -- 2.4 On-Off Attack and Sybil Attack Model -- 3 Anti-attack Trust Evaluation Algorithm -- 4 Simulation Platform -- 4.1 Overall Architecture of the Simulation Platform -- 4.2 SUMO Modular -- 4.3 NS3 Modular -- 4.4 Python Modular -- 5 Simulations and Analysis -- 5.1 Simulation Parameters -- 5.2 Performance Comparison Without Attacks -- 5.3 Performance Under On-Off Attack and Sybil Attack -- 5.4 The Impact of Trust Management System on VANET -- 6 Conclusion -- References -- A Dummy Query-Based User Privacy Protection Scheme in Named Data Networking -- 1 Introduction -- 2 Scenario and Problem Analysis -- 2.1 Attack Model -- 2.2 Problem Description -- 3 Principles of Constructing Dummy Query Set -- 3.1 Privacy Metric. 327 $a3.2 Privacy Constraints -- 3.3 Bandwidth Constraint -- 3.4 Distributional Constraint -- 3.5 Problem Modeling -- 4 Dummy Query Set Selection Algorithms -- 4.1 Dummy Query Distribution Assurance Algorithm -- 4.2 Dummy Query Filtering Algorithm -- 4.3 Algorithm Time Complexity Analysis -- 4.4 Security Analysis -- 5 Experiments and Simulations -- 5.1 Experimental Scenario -- 5.2 Experimental Result -- 6 Conclusion -- References -- Analytic Hierarchy Process Based Cell Reselection for Inactive Users in LEO Satellite Networks -- 1 Introduction -- 2 System Model -- 2.1 LEO Satellite Communication System -- 2.2 Received Signal Strength -- 2.3 Remaining Service Time -- 3 AHP Based Cell Reselection Strategy -- 3.1 Multiple-target Cell Reselection Process -- 3.2 AHP-Based Weights Decision Process -- 4 Simulation and Analysis -- 4.1 Simulation Scenarios and Parameter Settings -- 4.2 Simulation Results Analysis -- 5 Conclusion -- References -- Resource Allocation and MEAR Maximization for RIS-Aided eMBB/URLLC Traffic Multiplexing -- 1 Introduction -- 2 System Model and Problem Formulation -- 2.1 System Model -- 3 Solution Approach -- 3.1 eMBB Resource Allocation -- 3.2 URLLC Resource Allocation -- 4 Computational Complexity Analysis -- 5 Simulation Results and Discussions -- 5.1 Simulation Setup -- 5.2 Simulation Results -- 6 Conclusion -- References -- Deep Learning Applications and Optimization -- Enhancing Network Intrusion Detection with Deep Oversampling and Convolutional Autoencoder for Imbalanced Dataset -- 1 Introduction -- 2 Related Work -- 2.1 Sampling Methods for Imbalanced Data -- 2.2 Deep Learning Techniques for Imbalanced Data -- 3 Proposed Method -- 3.1 DCAES Based Minority Class Generating -- 3.2 DBSCAN Based Undersampling -- 3.3 Tomek Links Based Undersampling -- 3.4 Classification and Detection -- 4 Experiments and Evaluations. 327 $a4.1 Dataset Description -- 4.2 Data Preprocessing -- 4.3 Data Balancing Process -- 4.4 Evaluation Metric -- 4.5 Analysis of Results -- 5 Conclusion -- References -- Analyzing Average Age of Information in CRDSA Protocol with Access-Banned Policy -- 1 Introduction -- 2 System Model -- 3 Age-Critical Access-Banned Policy -- 3.1 CRDSA Protocol -- 3.2 Access-Banned Policy -- 3.3 ASP and AAoI Performance -- 4 Simulation Results and Analysis -- 5 Conclusion -- References -- VEC System for Vehicle-to-Vehicle Communication Task Offloading Strategy Research -- 1 Introduction -- 2 Related Work -- 3 System Model -- 3.1 Signal Strength Model -- 3.2 Delay Model -- 3.3 Offloading Model -- 4 Solution -- 4.1 Vehicle Screening Algorithm -- 4.2 Value Iteration Algorithm -- 5 Simulation and Analysis -- 6 Conclusions -- References -- Research on Synchronization Technology of Dynamic Environment Signals in the Laser Measurement and Control System -- 1 Introduction -- 1.1 Research Background -- 1.2 Main Contributions -- 1.3 Organization -- 2 System Model and Basic Principle -- 3 Performance Analysis -- 3.1 PPM Modulation -- 3.2 Sliding Correlation Acquisition Algorithm -- 3.3 Variable-Parameter Digital Delay Lock Loop -- 4 Simulation Results and Analysis -- 4.1 Capture Algorithm -- 4.2 Tracking Algorithm -- 4.3 Distance Measurement Simulation -- 5 Conclusion -- References -- A Generic Solution for IoT Ontology Model Based on OCF Standard -- 1 Introduction -- 2 Related Work -- 2.1 Ontology of the IoT -- 2.2 OCF Framework -- 3 Thing Specification Model -- 3.1 Thing Model -- 3.2 Static Model -- 3.3 Dynamic Model -- 3.4 Collection Model -- 4 System Implementation -- 4.1 Ontology Mapping -- 4.2 Action Interaction -- 4.3 Event Interaction -- 4.4 Service Linkage -- 5 Ontology-Based Model Evaluation -- 5.1 Ontology Reuse -- 5.2 Language Completeness -- 5.3 Ontology Extensibility. 327 $a5.4 Comprehensive Assessment of Model. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Series 700 $aGao$b Feifei$0995786 701 $aWu$b Jun$01064415 701 $aLi$b Yun$01337571 701 $aGao$b Honghao$01369360 701 $aWang$b Shangguang$01380312 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910878994403321 996 $aCommunications and Networking$94206112 997 $aUNINA