Loading [MathJax]/extensions/MathZoom.js
Wei Ni - IEEE Xplore Author Profile

Showing 1-25 of 344 results

Filter Results

Show

Results

Integrated sensing and communication (ISAC) technology has emerged as a potential enabler for efficient data transmission and sensing in unmanned aerial vehicle (UAV) networks. In this letter, we investigate a UAV-ISAC system, where a UAV furnishes downlink communication and simultaneous sensing for mobile ground nodes (GNs). To address this non-convex optimization problem and prevent retraining r...Show More
Effective resource allocation is critical to the efficiency of semantic communications, especially when faced with limited energy supplies and constrained communication resources. The unique requirements of semantic communications have brought new challenges to the joint optimization of energy and communication resources. This paper presents a novel deep reinforcement learning (DRL)-based algorith...Show More
This paper exploits the potential of edge intelligence empowered satellite-terrestrial networks, where users’ computation tasks are offloaded to the satellites or terrestrial base stations. The computation task offloading in such networks involves the edge cloud selection and bandwidth allocations for the access and backhaul links, which aims to minimize the energy consumption under the delay and ...Show More
This paper proposes a new joint random caching and hierarchical transmission scheme for delivering multimedia content in cache-assisted heterogeneous networks. We use scalable video coding (SVC) and wireless edge caching to offer personalized video-watching services to end users. Resorting to stochastic geometry, we derive new expressions for successful transmission probabilities (STPs). Using the...Show More
This letter puts forth a new hybrid horizontal-vertical federated learning (HoVeFL) for mobile edge computing-enabled Internet of Things (EdgeIoT). In this framework, certain EdgeIoT devices train local models using the same data samples but analyze disparate data features, while the others focus on the same features using non-independent and identically distributed (non-IID) data samples. Thus, e...Show More
Driving trajectory data remains vulnerable to privacy breaches despite existing mitigation measures. Traditional methods for detecting driving trajectories typically rely on map-matching the path using Global Positioning System (GPS) data, which is susceptible to GPS data outage. This paper introduces CAN-Trace, a novel privacy attack mechanism that leverages Controller Area Network (CAN) messages...Show More
In the upcoming 6G era, inclusive intelligent services(IISs) that rely on integrated communications and AI arithmetic will become the norm. These services require efficient distributed intelligent learning or reasoning. However, with the proliferation of complex applications, providing differentiated and customized services through effective network function chain (NFC) orchestration has become a ...Show More
This paper optimizes the beamforming design of a downlink multiple-input multiple-output (MIMO) dual-function radar-communication (DFRC) system to maximize the weighted communication sum-rate under a prescribed transmit covariance constraint for radar performance guarantee. In the single-user case, we show that the transmit covariance constraint implies the existence of inherent orthogonality amon...Show More
Accurate and real-time acquisition of vehicular system dynamic states, road surface conditions, and motion states of surrounding participants is crucial for the safety, passenger comfort, and operational efficiency of autonomous vehicles (AVs) and connected automated vehicles (CAVs). In recent years, a significant amount of research has contributed to the field of state estimation for vehicles, ro...Show More
Fairness in Federated Learning (FL) is imperative not only for the ethical utilization of technology but also for ensuring that models provide accurate, equitable, and beneficial outcomes across varied user demographics and equipment. This paper proposes a new adversarial architecture, referred to as Adversarial Graph Attention Network (AGAT), which deliberately instigates fairness attacks with an...Show More
Data traffic has grown exponentially with the rapid development of Narrowband Internet of Things (NB-IoT) technology. Nonorthogonal multiple access (NOMA) and mobile edge computing (MEC) are essential technologies to enhance the performance of NB-IoT networks. This article proposes a new hybrid NOMA offloading strategy, allowing an Internet of Things (IoT) device to execute NOMA with other devices...Show More
This paper proposes a new Signal-to-interference-plus-noise ratio (SINR)-based Device selection, Power control, and Reconfigurable intelligent surface (RIS) configuration (SDPR) algorithm, which allows imperfect aggregation of wireless federated learning (FL) in RIS-assisted Non-Orthogonal Multiple Access (NOMA) systems. The SDPR algorithm selects the local models with SINRs within an acceptable r...Show More
This article concentrates on the pricing design in electric vehicle (EV) platoon charging networks with hybrid traffic flows, where there exist different sizes of EV platoons, and charging stations have different amounts of available renewable energy. Two pricing schemes are proposed in terms of behavior awareness and congestion awareness to strike a balance between network revenue, renewable ener...Show More
This article puts forth a new training data-untethered model poisoning (MP) attack on federated learning (FL). The new MP attack extends an adversarial variational graph autoencoder (VGAE) to create malicious local models based solely on the benign local models overheard without any access to the training data of FL. Such an advancement leads to the VGAE-MP attack that is not only efficacious but ...Show More
Federated learning (FL) offers an effective learning architecture to protect data privacy in a distributed manner. However, the inevitable network asynchrony, overdependence on a central coordinator, and lack of an open and fair incentive mechanism collectively hinder FL’s further development. We propose IronForge, a new generation of FL framework, that features a directed acyclic graph (DAG)-base...Show More
Multi-access edge computing (MEC) offloads services for mobile users to facilitate the integration of idle cloudlet resources and bring cloud services closer to users. Existing studies have focused primarily on task coordination and resource allocation with strict time constraints, and typically overlooked the potential privacy leakage of users’ participation strategies in MEC. This paper proposes...Show More
This letter presents a new over-the-air federated learning (OTA-FL) system supported by a user-centric cell-free (UCCF) network. We propose a two-level hierarchical deep reinforcement learning (HDRL) framework that minimizes mean squared error (MSE) derived from convergence analysis by jointly optimizing AP-device association (ADA) and power control (PC). Specifically, a soft actor-critic (SAC) wi...Show More
Security vulnerabilities in smart contracts can have serious economic consequences. Existing smart contract vulnerability detection methods rely primarily on strict rules defined by experts, making current research limited to detecting specific known vulnerabilities and difficult to deal with other types of anomalous contracts (i.e., the variants of contracts with potentially known vulnerabilities...Show More
Federated learning (FL), typically coordinated by a centralized server, faces the risk of a single-point failure during the model aggregation process. Moreover, existing privacy protection methods for FL model parameters, such as homomorphic encryption (HE) and differential privacy (DP), still suffer from high computational costs or reduced model availability. Malicious trainers can also transmit ...Show More
Training deep neural networks (DNNs) with altered data, known as adversarial training, is essential for improving their robustness. A significant challenge emerges as the robustness strengthened during training often diminishes during inference, resulting in drops in robust pronounced accuracy. Contemporary strategies either necessitate excessively large training data or risk compromising the natu...Show More
Perceiving the mobility of the passive targets is critical in the context of Integrated Sensing and Communication (ISAC). While target localization has been extensively studied in radio sensing, the motion estimation and tracking of the targets have not been revealed. This paper proposes a new framework for joint UE and target tracking in the multi-static sensing system under the promising scenari...Show More
Unknown smart contract vulnerabilities objectively exist in addition to common vulnerabilities, and their potential risks cannot be ignored. Therefore, it is crucial to enhance the model's ability to detect these unknown threats. Detection models are typically trained for specific types of vulnerability data. As a result, their effectiveness in detecting new vulnerabilities can be unsatisfactory. ...Show More
Establishing network slices in line with the intent of particular applications through closed-loop automation represents a key goal on designing future advanced networks. However, the lack of association between application intents and network services imposes challenges to accurately capture user preference and generate customized network slices. This article introduces Intent-Oriented Network Sl...Show More
Split AI inference partitions an artificial intelligence (AI) model into multiple parts, enabling the offloading of computation-intensive AI services. Resource allocation is critical for the performance of split AI inference. The challenge arises from the time-sensitivity of many services versus time-varying traffic arrivals and network conditions. The conventional prediction-based resource alloca...Show More
Unmanned aerial vehicles (UAVs) have demonstrated success in delivering goods, but their delivery distances are limited due to their finite battery capacity. While roadside charging stations can replenish the battery, they cause delays and prevent timely delivery. In this paper, we present a novel UAV charging scheduling and speed control framework that optimizes the decisions on flight speed and ...Show More