Skip to main content

Showing 1–50 of 120 results for author: Hoang, D T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2503.07869  [pdf, other

    cs.LG cs.AI cs.DC cs.GT

    Right Reward Right Time for Federated Learning

    Authors: Thanh Linh Nguyen, Dinh Thai Hoang, Diep N. Nguyen, Quoc-Viet Pham

    Abstract: Critical learning periods (CLPs) in federated learning (FL) refer to early stages during which low-quality contributions (e.g., sparse training data availability) can permanently impair the learning performance of the global model owned by the model owner (i.e., the cloud server). However, strategies to motivate clients with high-quality contributions to join the FL training process and share trai… ▽ More

    Submitted 10 March, 2025; originally announced March 2025.

    Comments: IEEE Journal Submission

  2. arXiv:2503.04860  [pdf, other

    cs.CV eess.SP

    End-to-End Human Pose Reconstruction from Wearable Sensors for 6G Extended Reality Systems

    Authors: Nguyen Quang Hieu, Dinh Thai Hoang, Diep N. Nguyen, Mohammad Abu Alsheikh, Carlos C. N. Kuhn, Yibeltal F. Alem, Ibrahim Radwan

    Abstract: Full 3D human pose reconstruction is a critical enabler for extended reality (XR) applications in future sixth generation (6G) networks, supporting immersive interactions in gaming, virtual meetings, and remote collaboration. However, achieving accurate pose reconstruction over wireless networks remains challenging due to channel impairments, bit errors, and quantization effects. Existing approach… ▽ More

    Submitted 6 March, 2025; originally announced March 2025.

  3. arXiv:2501.08149  [pdf, other

    cs.AI cs.LG stat.ML

    Multiple-Input Variational Auto-Encoder for Anomaly Detection in Heterogeneous Data

    Authors: Phai Vu Dinh, Diep N. Nguyen, Dinh Thai Hoang, Quang Uy Nguyen, Eryk Dutkiewicz

    Abstract: Anomaly detection (AD) plays a pivotal role in AI applications, e.g., in classification, and intrusion/threat detection in cybersecurity. However, most existing methods face challenges of heterogeneity amongst feature subsets posed by non-independent and identically distributed (non-IID) data. We propose a novel neural network model called Multiple-Input Auto-Encoder for AD (MIAEAD) to address thi… ▽ More

    Submitted 14 January, 2025; originally announced January 2025.

    Comments: 16 pages

  4. arXiv:2501.01038  [pdf, other

    cs.NI eess.SP

    Energy-Efficient and Intelligent ISAC in V2X Networks with Spiking Neural Networks-Driven DRL

    Authors: Chen Shang, Jiadong Yu, Dinh Thai Hoang

    Abstract: Integrated sensing and communication (ISAC) has emerged as a pivotal technology for enabling vehicle-to-everything (V2X) connectivity, mobility, and security. However, designing efficient beamforming schemes to achieve accurate sensing and enhance communication performance in the dynamic and uncertain environments of V2X networks presents significant challenges. While AI technologies offer promisi… ▽ More

    Submitted 1 January, 2025; originally announced January 2025.

    Comments: 13 pages, 12 figures

  5. arXiv:2412.20484  [pdf, other

    cs.NI eess.SP

    Exploiting NOMA Transmissions in Multi-UAV-assisted Wireless Networks: From Aerial-RIS to Mode-switching UAVs

    Authors: Songhan Zhao, Shimin Gong, Bo Gu, Lanhua Li, Bin Lyu, Dinh Thai Hoang, Changyan Yi

    Abstract: In this paper, we consider an aerial reconfigurable intelligent surface (ARIS)-assisted wireless network, where multiple unmanned aerial vehicles (UAVs) collect data from ground users (GUs) by using the non-orthogonal multiple access (NOMA) method. The ARIS provides enhanced channel controllability to improve the NOMA transmissions and reduce the co-channel interference among UAVs. We also propose… ▽ More

    Submitted 29 December, 2024; originally announced December 2024.

  6. arXiv:2412.13522  [pdf, other

    cs.CR

    Privacy-Preserving Cyberattack Detection in Blockchain-Based IoT Systems Using AI and Homomorphic Encryption

    Authors: Bui Duc Manh, Chi-Hieu Nguyen, Dinh Thai Hoang, Diep N. Nguyen, Ming Zeng, Quoc-Viet Pham

    Abstract: This work proposes a novel privacy-preserving cyberattack detection framework for blockchain-based Internet-of-Things (IoT) systems. In our approach, artificial intelligence (AI)-driven detection modules are strategically deployed at blockchain nodes to identify real-time attacks, ensuring high accuracy and minimal delay. To achieve this efficiency, the model training is conducted by a cloud servi… ▽ More

    Submitted 18 December, 2024; originally announced December 2024.

  7. arXiv:2411.10082  [pdf, other

    cs.IT

    Jointly Optimizing Power Allocation and Device Association for Robust IoT Networks under Infeasible Circumstances

    Authors: Nguyen Xuan Tung, Trinh Van Chien, Dinh Thai Hoang, Won Joo Hwang

    Abstract: Jointly optimizing power allocation and device association is crucial in Internet-of-Things (IoT) networks to ensure devices achieve their data throughput requirements. Device association, which assigns IoT devices to specific access points (APs), critically impacts resource allocation. Many existing works often assume all data throughput requirements are satisfied, which is impractical given reso… ▽ More

    Submitted 15 November, 2024; originally announced November 2024.

    Comments: 18 pages, 8 figures, and 4 tables. Accepted by IEEE Transactions on Network and Service Management

  8. arXiv:2410.23639  [pdf, other

    cs.HC cs.NI

    Biologically-Inspired Technologies: Integrating Brain-Computer Interface and Neuromorphic Computing for Human Digital Twins

    Authors: Chen Shang, Jiadong Yu, Dinh Thai Hoang

    Abstract: The integration of immersive communication into a human-centric ecosystem has intensified the demand for sophisticated Human Digital Twins (HDTs) driven by multifaceted human data. However, the effective construction of HDTs faces significant challenges due to the heterogeneity of data collection devices, the high energy demands associated with processing intricate data, and concerns over the priv… ▽ More

    Submitted 13 January, 2025; v1 submitted 31 October, 2024; originally announced October 2024.

    Comments: 9 pages, 5 figures,

  9. arXiv:2410.18115  [pdf, other

    cs.CV cs.AI cs.LG

    Point Cloud Compression with Bits-back Coding

    Authors: Nguyen Quang Hieu, Minh Nguyen, Dinh Thai Hoang, Diep N. Nguyen, Eryk Dutkiewicz

    Abstract: This paper introduces a novel lossless compression method for compressing geometric attributes of point cloud data with bits-back coding. Our method specializes in using a deep learning-based probabilistic model to estimate the Shannon's entropy of the point cloud information, i.e., geometric attributes of the 3D floating points. Once the entropy of the point cloud dataset is estimated with a conv… ▽ More

    Submitted 9 October, 2024; originally announced October 2024.

    Comments: This paper is under reviewed in IEEE Robotics and Automation Letters

  10. arXiv:2410.17971  [pdf, other

    cs.NI cs.AI

    Dynamic Spectrum Access for Ambient Backscatter Communication-assisted D2D Systems with Quantum Reinforcement Learning

    Authors: Nguyen Van Huynh, Bolun Zhang, Dinh-Hieu Tran, Dinh Thai Hoang, Diep N. Nguyen, Gan Zheng, Dusit Niyato, Quoc-Viet Pham

    Abstract: Spectrum access is an essential problem in device-to-device (D2D) communications. However, with the recent growth in the number of mobile devices, the wireless spectrum is becoming scarce, resulting in low spectral efficiency for D2D communications. To address this problem, this paper aims to integrate the ambient backscatter communication technology into D2D devices to allow them to backscatter a… ▽ More

    Submitted 23 October, 2024; originally announced October 2024.

    Comments: 12 pages, 7 figures

  11. arXiv:2409.04972  [pdf, other

    cs.CR cs.LG

    Balancing Security and Accuracy: A Novel Federated Learning Approach for Cyberattack Detection in Blockchain Networks

    Authors: Tran Viet Khoa, Mohammad Abu Alsheikh, Yibeltal Alem, Dinh Thai Hoang

    Abstract: This paper presents a novel Collaborative Cyberattack Detection (CCD) system aimed at enhancing the security of blockchain-based data-sharing networks by addressing the complex challenges associated with noise addition in federated learning models. Leveraging the theoretical principles of differential privacy, our approach strategically integrates noise into trained sub-models before reconstructin… ▽ More

    Submitted 8 September, 2024; originally announced September 2024.

    Comments: 13 pages

  12. arXiv:2409.00827  [pdf, ps, other

    math.CO cs.DM

    Log-concavity of the independence polynomials of $\mathbf{W}_{p}$ graphs

    Authors: Do Trong Hoang, Vadim E. Levit, Eugen Mandrescu, My Hanh Pham

    Abstract: Let $G$ be a $\mathbf{W}_{p}$ graph if $n\geq p$ and every $p$ pairwise disjoint independent sets of $G$ are contained within $p$ pairwise disjoint maximum independent sets. In this paper, we establish that every $\mathbf{W}_{p}$ graph $G$ is $p$-quasi-regularizable if and only if $n\geq (p+1)α$, where $α$ is the independence number of $G$. This finding ensures that the independence polynomial of… ▽ More

    Submitted 1 September, 2024; originally announced September 2024.

    Comments: 16 pages, 2 figures

    MSC Class: 05C31; 05C69 (Primary) 05C05; 05C48 (Secondary) ACM Class: G.2.1; G.2.2

  13. arXiv:2409.00087  [pdf, other

    eess.SP cs.AI

    A Lightweight Human Pose Estimation Approach for Edge Computing-Enabled Metaverse with Compressive Sensing

    Authors: Nguyen Quang Hieu, Dinh Thai Hoang, Diep N. Nguyen

    Abstract: The ability to estimate 3D movements of users over edge computing-enabled networks, such as 5G/6G networks, is a key enabler for the new era of extended reality (XR) and Metaverse applications. Recent advancements in deep learning have shown advantages over optimization techniques for estimating 3D human poses given spare measurements from sensor signals, i.e., inertial measurement unit (IMU) sens… ▽ More

    Submitted 25 August, 2024; originally announced September 2024.

  14. arXiv:2408.12480  [pdf, other

    cs.LG cs.CL

    Vintern-1B: An Efficient Multimodal Large Language Model for Vietnamese

    Authors: Khang T. Doan, Bao G. Huynh, Dung T. Hoang, Thuc D. Pham, Nhat H. Pham, Quan T. M. Nguyen, Bang Q. Vo, Suong N. Hoang

    Abstract: In this report, we introduce Vintern-1B, a reliable 1-billion-parameters multimodal large language model (MLLM) for Vietnamese language tasks. By integrating the Qwen2-0.5B-Instruct language model with the InternViT-300M-448px visual model, Vintern-1B is optimized for a range of applications, including optical character recognition (OCR), document extraction, and general question-answering in Viet… ▽ More

    Submitted 23 August, 2024; v1 submitted 22 August, 2024; originally announced August 2024.

  15. arXiv:2407.18503  [pdf, other

    cs.CR

    Homomorphic Encryption-Enabled Federated Learning for Privacy-Preserving Intrusion Detection in Resource-Constrained IoV Networks

    Authors: Bui Duc Manh, Chi-Hieu Nguyen, Dinh Thai Hoang, Diep N. Nguyen

    Abstract: This paper aims to propose a novel framework to address the data privacy issue for Federated Learning (FL)-based Intrusion Detection Systems (IDSs) in Internet-of-Vehicles(IoVs) with limited computational resources. In particular, in conventional FL systems, it is usually assumed that the computing nodes have sufficient computational resources to process the training tasks. However, in practical I… ▽ More

    Submitted 26 July, 2024; originally announced July 2024.

  16. arXiv:2407.15603  [pdf, other

    cs.CR

    Semi-Supervised Learning for Anomaly Detection in Blockchain-based Supply Chains

    Authors: Do Hai Son, Bui Duc Manh, Tran Viet Khoa, Nguyen Linh Trung, Dinh Thai Hoang, Hoang Trong Minh, Yibeltal Alem, Le Quang Minh

    Abstract: Blockchain-based supply chain (BSC) systems have tremendously been developed recently and can play an important role in our society in the future. In this study, we develop an anomaly detection model for BSC systems. Our proposed model can detect cyber-attacks at various levels, including the network layer, consensus layer, and beyond, by analyzing only the traffic data at the network layer. To do… ▽ More

    Submitted 22 July, 2024; originally announced July 2024.

  17. Real-time Cyberattack Detection with Collaborative Learning for Blockchain Networks

    Authors: Tran Viet Khoa, Do Hai Son, Dinh Thai Hoang, Nguyen Linh Trung, Tran Thi Thuy Quynh, Diep N. Nguyen, Nguyen Viet Ha, Eryk Dutkiewicz

    Abstract: With the ever-increasing popularity of blockchain applications, securing blockchain networks plays a critical role in these cyber systems. In this paper, we first study cyberattacks (e.g., flooding of transactions, brute pass) in blockchain networks and then propose an efficient collaborative cyberattack detection model to protect blockchain networks. Specifically, we deploy a blockchain network i… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

  18. arXiv:2405.11895  [pdf, other

    cs.LG eess.SY

    Sparse Attention-driven Quality Prediction for Production Process Optimization in Digital Twins

    Authors: Yanlei Yin, Lihua Wang, Dinh Thai Hoang, Wenbo Wang, Dusit Niyato

    Abstract: In the process industry, long-term and efficient optimization of production lines requires real-time monitoring and analysis of operational states to fine-tune production line parameters. However, complexity in operational logic and intricate coupling of production process parameters make it difficult to develop an accurate mathematical model for the entire process, thus hindering the deployment o… ▽ More

    Submitted 24 August, 2024; v1 submitted 20 May, 2024; originally announced May 2024.

  19. arXiv:2404.06257  [pdf, other

    cs.NI

    DDPG-E2E: A Novel Policy Gradient Approach for End-to-End Communication Systems

    Authors: Bolun Zhang, Nguyen Van Huynh, Dinh Thai Hoang, Diep N. Nguyen, Quoc-Viet Pham

    Abstract: The End-to-end (E2E) learning-based approach has great potential to reshape the existing communication systems by replacing the transceivers with deep neural networks. To this end, the E2E learning approach needs to assume the availability of prior channel information to mathematically formulate a differentiable channel layer for the backpropagation (BP) of the error gradients, thereby jointly opt… ▽ More

    Submitted 28 October, 2024; v1 submitted 9 April, 2024; originally announced April 2024.

  20. arXiv:2403.15511  [pdf, other

    cs.LG cs.AI cs.CR

    Multiple-Input Auto-Encoder Guided Feature Selection for IoT Intrusion Detection Systems

    Authors: Phai Vu Dinh, Diep N. Nguyen, Dinh Thai Hoang, Quang Uy Nguyen, Eryk Dutkiewicz, Son Pham Bao

    Abstract: While intrusion detection systems (IDSs) benefit from the diversity and generalization of IoT data features, the data diversity (e.g., the heterogeneity and high dimensions of data) also makes it difficult to train effective machine learning models in IoT IDSs. This also leads to potentially redundant/noisy features that may decrease the accuracy of the detection engine in IDSs. This paper first i… ▽ More

    Submitted 21 March, 2024; originally announced March 2024.

  21. arXiv:2403.07763  [pdf, other

    cs.NI cs.ET

    Emerging Technologies for 6G Non-Terrestrial-Networks: From Academia to Industrial Applications

    Authors: Cong T. Nguyen, Yuris Mulya Saputra, Nguyen Van Huynh, Tan N. Nguyen, Dinh Thai Hoang, Diep N Nguyen, Van-Quan Pham, Miroslav Voznak, Symeon Chatzinotas, Dinh-Hieu Tran

    Abstract: Terrestrial networks form the fundamental infrastructure of modern communication systems, serving more than 4 billion users globally. However, terrestrial networks are facing a wide range of challenges, from coverage and reliability to interference and congestion. As the demands of the 6G era are expected to be much higher, it is crucial to address these challenges to ensure a robust and efficient… ▽ More

    Submitted 3 July, 2024; v1 submitted 12 March, 2024; originally announced March 2024.

    Comments: 35 pages

  22. arXiv:2402.18062  [pdf, other

    cs.RO cs.AI

    Generative AI for Unmanned Vehicle Swarms: Challenges, Applications and Opportunities

    Authors: Guangyuan Liu, Nguyen Van Huynh, Hongyang Du, Dinh Thai Hoang, Dusit Niyato, Kun Zhu, Jiawen Kang, Zehui Xiong, Abbas Jamalipour, Dong In Kim

    Abstract: With recent advances in artificial intelligence (AI) and robotics, unmanned vehicle swarms have received great attention from both academia and industry due to their potential to provide services that are difficult and dangerous to perform by humans. However, learning and coordinating movements and actions for a large number of unmanned vehicles in complex and dynamic environments introduce signif… ▽ More

    Submitted 28 February, 2024; originally announced February 2024.

    Comments: 23 pages

  23. arXiv:2402.00238  [pdf, other

    cs.LG eess.IV q-bio.QM

    CNN-FL for Biotechnology Industry Empowered by Internet-of-BioNano Things and Digital Twins

    Authors: Mohammad, Jamshidi, Dinh Thai Hoang, Diep N. Nguyen

    Abstract: Digital twins (DTs) are revolutionizing the biotechnology industry by enabling sophisticated digital representations of biological assets, microorganisms, drug development processes, and digital health applications. However, digital twinning at micro and nano scales, particularly in modeling complex entities like bacteria, presents significant challenges in terms of requiring advanced Internet of… ▽ More

    Submitted 31 January, 2024; originally announced February 2024.

  24. arXiv:2401.15625  [pdf, other

    cs.CR cs.AI

    Generative AI-enabled Blockchain Networks: Fundamentals, Applications, and Case Study

    Authors: Cong T. Nguyen, Yinqiu Liu, Hongyang Du, Dinh Thai Hoang, Dusit Niyato, Diep N. Nguyen, Shiwen Mao

    Abstract: Generative Artificial Intelligence (GAI) has recently emerged as a promising solution to address critical challenges of blockchain technology, including scalability, security, privacy, and interoperability. In this paper, we first introduce GAI techniques, outline their applications, and discuss existing solutions for integrating GAI into blockchains. Then, we discuss emerging solutions that demon… ▽ More

    Submitted 28 January, 2024; originally announced January 2024.

  25. arXiv:2401.14420  [pdf, other

    cs.CR

    A Novel Blockchain Based Information Management Framework for Web 3.0

    Authors: Md Arif Hassan, Cong T. Nguyen, Chi-Hieu Nguyen, Dinh Thai Hoang, Diep N. Nguyen, Eryk Dutkiewicz

    Abstract: Web 3.0 is the third generation of the World Wide Web (WWW), concentrating on the critical concepts of decentralization, availability, and increasing client usability. Although Web 3.0 is undoubtedly an essential component of the future Internet, it currently faces critical challenges, including decentralized data collection and management. To overcome these challenges, blockchain has emerged as o… ▽ More

    Submitted 23 January, 2024; originally announced January 2024.

  26. arXiv:2401.10901  [pdf, other

    cs.CY

    Enabling Technologies for Web 3.0: A Comprehensive Survey

    Authors: Md Arif Hassan, Mohammad Behdad Jamshidi, Bui Duc Manh, Nam H. Chu, Chi-Hieu Nguyen, Nguyen Quang Hieu, Cong T. Nguyen, Dinh Thai Hoang, Diep N. Nguyen, Nguyen Van Huynh, Mohammad Abu Alsheikh, Eryk Dutkiewicz

    Abstract: Web 3.0 represents the next stage of Internet evolution, aiming to empower users with increased autonomy, efficiency, quality, security, and privacy. This evolution can potentially democratize content access by utilizing the latest developments in enabling technologies. In this paper, we conduct an in-depth survey of enabling technologies in the context of Web 3.0, such as blockchain, semantic web… ▽ More

    Submitted 29 December, 2023; originally announced January 2024.

  27. arXiv:2312.07011  [pdf, other

    cs.IT eess.SP

    Securing MIMO Wiretap Channel with Learning-Based Friendly Jamming under Imperfect CSI

    Authors: Bui Minh Tuan, Diep N. Nguyen, Nguyen Linh Trung, Van-Dinh Nguyen, Nguyen Van Huynh, Dinh Thai Hoang, Marwan Krunz, Eryk Dutkiewicz

    Abstract: Wireless communications are particularly vulnerable to eavesdropping attacks due to their broadcast nature. To effectively deal with eavesdroppers, existing security techniques usually require accurate channel state information (CSI), e.g., for friendly jamming (FJ), and/or additional computing resources at transceivers, e.g., cryptography-based solutions, which unfortunately may not be feasible i… ▽ More

    Submitted 27 October, 2024; v1 submitted 12 December, 2023; originally announced December 2023.

    Comments: 12 pages, 15 figures

  28. arXiv:2312.05594  [pdf, other

    cs.NI cs.AI

    Generative AI for Physical Layer Communications: A Survey

    Authors: Nguyen Van Huynh, Jiacheng Wang, Hongyang Du, Dinh Thai Hoang, Dusit Niyato, Diep N. Nguyen, Dong In Kim, Khaled B. Letaief

    Abstract: The recent evolution of generative artificial intelligence (GAI) leads to the emergence of groundbreaking applications such as ChatGPT, which not only enhances the efficiency of digital content production, such as text, audio, video, or even network traffic data, but also enriches its diversity. Beyond digital content creation, GAI's capability in analyzing complex data distributions offers great… ▽ More

    Submitted 9 December, 2023; originally announced December 2023.

  29. arXiv:2312.02490  [pdf, other

    cs.LG cs.CR

    Constrained Twin Variational Auto-Encoder for Intrusion Detection in IoT Systems

    Authors: Phai Vu Dinh, Quang Uy Nguyen, Dinh Thai Hoang, Diep N. Nguyen, Son Pham Bao, Eryk Dutkiewicz

    Abstract: Intrusion detection systems (IDSs) play a critical role in protecting billions of IoT devices from malicious attacks. However, the IDSs for IoT devices face inherent challenges of IoT systems, including the heterogeneity of IoT data/devices, the high dimensionality of training data, and the imbalanced data. Moreover, the deployment of IDSs on IoT systems is challenging, and sometimes impossible, d… ▽ More

    Submitted 4 December, 2023; originally announced December 2023.

  30. arXiv:2310.20228  [pdf, other

    cs.HC

    Reconstructing Human Pose from Inertial Measurements: A Generative Model-based Compressive Sensing Approach

    Authors: Nguyen Quang Hieu, Dinh Thai Hoang, Diep N. Nguyen, Mohammad Abu Alsheikh

    Abstract: The ability to sense, localize, and estimate the 3D position and orientation of the human body is critical in virtual reality (VR) and extended reality (XR) applications. This becomes more important and challenging with the deployment of VR/XR applications over the next generation of wireless systems such as 5G and beyond. In this paper, we propose a novel framework that can reconstruct the 3D hum… ▽ More

    Submitted 12 May, 2024; v1 submitted 31 October, 2023; originally announced October 2023.

  31. arXiv:2310.07497  [pdf, other

    cs.LG cs.AI

    Sample-Driven Federated Learning for Energy-Efficient and Real-Time IoT Sensing

    Authors: Minh Ngoc Luu, Minh-Duong Nguyen, Ebrahim Bedeer, Van Duc Nguyen, Dinh Thai Hoang, Diep N. Nguyen, Quoc-Viet Pham

    Abstract: In the domain of Federated Learning (FL) systems, recent cutting-edge methods heavily rely on ideal conditions convergence analysis. Specifically, these approaches assume that the training datasets on IoT devices possess similar attributes to the global data distribution. However, this approach fails to capture the full spectrum of data characteristics in real-time sensing FL systems. In order to… ▽ More

    Submitted 11 October, 2023; originally announced October 2023.

    Comments: 17 pages, 5 figures

    MSC Class: 68-00 ACM Class: I.2.11

  32. arXiv:2310.03614  [pdf

    cs.LG cs.CY

    Adversarial Machine Learning for Social Good: Reframing the Adversary as an Ally

    Authors: Shawqi Al-Maliki, Adnan Qayyum, Hassan Ali, Mohamed Abdallah, Junaid Qadir, Dinh Thai Hoang, Dusit Niyato, Ala Al-Fuqaha

    Abstract: Deep Neural Networks (DNNs) have been the driving force behind many of the recent advances in machine learning. However, research has shown that DNNs are vulnerable to adversarial examples -- input samples that have been perturbed to force DNN-based models to make errors. As a result, Adversarial Machine Learning (AdvML) has gained a lot of attention, and researchers have investigated these vulner… ▽ More

    Submitted 5 October, 2023; originally announced October 2023.

  33. arXiv:2309.01848  [pdf, other

    cs.HC

    A Human-Centric Metaverse Enabled by Brain-Computer Interface: A Survey

    Authors: Howe Yuan Zhu, Nguyen Quang Hieu, Dinh Thai Hoang, Diep N. Nguyen, Chin-Teng Lin

    Abstract: The growing interest in the Metaverse has generated momentum for members of academia and industry to innovate toward realizing the Metaverse world. The Metaverse is a unique, continuous, and shared virtual world where humans embody a digital form within an online platform. Through a digital avatar, Metaverse users should have a perceptual presence within the environment and can interact and contro… ▽ More

    Submitted 4 September, 2023; originally announced September 2023.

  34. arXiv:2308.15804  [pdf, other

    cs.CR cs.DC

    Collaborative Learning Framework to Detect Attacks in Transactions and Smart Contracts

    Authors: Tran Viet Khoa, Do Hai Son, Chi-Hieu Nguyen, Dinh Thai Hoang, Diep N. Nguyen, Tran Thi Thuy Quynh, Trong-Minh Hoang, Nguyen Viet Ha, Eryk Dutkiewicz, Abu Alsheikh, Nguyen Linh Trung

    Abstract: With the escalating prevalence of malicious activities exploiting vulnerabilities in blockchain systems, there is an urgent requirement for robust attack detection mechanisms. To address this challenge, this paper presents a novel collaborative learning framework designed to detect attacks in blockchain transactions and smart contracts by analyzing transaction features. Our framework exhibits the… ▽ More

    Submitted 10 August, 2024; v1 submitted 30 August, 2023; originally announced August 2023.

  35. arXiv:2308.04953  [pdf, other

    cs.NI cs.AI

    Wirelessly Powered Federated Learning Networks: Joint Power Transfer, Data Sensing, Model Training, and Resource Allocation

    Authors: Mai Le, Dinh Thai Hoang, Diep N. Nguyen, Won-Joo Hwang, Quoc-Viet Pham

    Abstract: Federated learning (FL) has found many successes in wireless networks; however, the implementation of FL has been hindered by the energy limitation of mobile devices (MDs) and the availability of training data at MDs. How to integrate wireless power transfer and mobile crowdsensing towards sustainable FL solutions is a research topic entirely missing from the open literature. This work for the fir… ▽ More

    Submitted 9 August, 2023; originally announced August 2023.

  36. arXiv:2308.02242  [pdf, ps, other

    cs.NI

    Countering Eavesdroppers with Meta-learning-based Cooperative Ambient Backscatter Communications

    Authors: Nam H. Chu, Nguyen Van Huynh, Diep N. Nguyen, Dinh Thai Hoang, Shimin Gong, Tao Shu, Eryk Dutkiewicz, Khoa T. Phan

    Abstract: This article introduces a novel lightweight framework using ambient backscattering communications to counter eavesdroppers. In particular, our framework divides an original message into two parts: (i) the active-transmit message transmitted by the transmitter using conventional RF signals and (ii) the backscatter message transmitted by an ambient backscatter tag that backscatters upon the active s… ▽ More

    Submitted 4 August, 2023; originally announced August 2023.

  37. arXiv:2307.13185  [pdf, ps, other

    quant-ph cs.DC

    Elastic Entangled Pair and Qubit Resource Management in Quantum Cloud Computing

    Authors: Rakpong Kaewpuang, Minrui Xu, Dinh Thai Hoang, Dusit Niyato, Han Yu, Ruidong Li, Zehui Xiong, Jiawen Kang

    Abstract: Quantum cloud computing (QCC) offers a promising approach to efficiently provide quantum computing resources, such as quantum computers, to perform resource-intensive tasks. Like traditional cloud computing platforms, QCC providers can offer both reservation and on-demand plans for quantum resource provisioning to satisfy users' requirements. However, the fluctuations in user demand and quantum ci… ▽ More

    Submitted 24 July, 2023; originally announced July 2023.

    Comments: 30 pages and 20 figures

  38. arXiv:2305.00367  [pdf, other

    cs.CR

    MetaShard: A Novel Sharding Blockchain Platform for Metaverse Applications

    Authors: Cong T. Nguyen, Dinh Thai Hoang, Diep N. Nguyen, Yong Xiao, Dusit Niyato, Eryk Dutkiewicz

    Abstract: Due to its security, transparency, and flexibility in verifying virtual assets, blockchain has been identified as one of the key technologies for Metaverse. Unfortunately, blockchain-based Metaverse faces serious challenges such as massive resource demands, scalability, and security concerns. To address these issues, this paper proposes a novel sharding-based blockchain framework, namely MetaShard… ▽ More

    Submitted 29 April, 2023; originally announced May 2023.

  39. arXiv:2304.10095  [pdf, ps, other

    cs.IT eess.SP

    Transmit Power Minimization for STAR-RIS Empowered Symbiotic Radio Communications

    Authors: Chao Zhou, Bin Lyu, Youhong Feng, Dinh Thai Hoang

    Abstract: In this paper, we propose a simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) empowered transmission scheme for symbiotic radio (SR) systems to make more flexibility for network deployment and enhance system performance. The STAR-RIS is utilized to not only beam the primary signals from the base station (BS) towards multiple primary users on the same side of… ▽ More

    Submitted 20 April, 2023; originally announced April 2023.

    Comments: 32 pages, 12 figures

  40. arXiv:2304.02398  [pdf, ps, other

    cs.IT eess.SP

    Robust Secure Transmission for Active RIS Enabled Symbiotic Radio Multicast Communications

    Authors: Bin Lyu, Chao Zhou, Shimin Gong, Dinh Thai Hoang, Ying-chang Liang

    Abstract: In this paper, we propose a robust secure transmission scheme for an active reconfigurable intelligent surface (RIS) enabled symbiotic radio (SR) system in the presence of multiple eavesdroppers (Eves). In the considered system, the active RIS is adopted to enable the secure transmission of primary signals from the primary transmitter to multiple primary users in a multicasting manner, and simulta… ▽ More

    Submitted 13 April, 2023; v1 submitted 5 April, 2023; originally announced April 2023.

    Comments: 32 Pages, 12 figures, accepted to IEEE Transactions on Wireless Communications

  41. arXiv:2303.10577  [pdf, other

    cs.HC

    Enhancing Immersion and Presence in the Metaverse with Over-the-Air Brain-Computer Interface

    Authors: Nguyen Quang Hieu, Dinh Thai Hoang, Diep N. Nguyen, Van-Dinh Nguyen, Yong Xiao, Eryk Dutkiewicz

    Abstract: This article proposes a novel framework that utilizes an over-the-air Brain-Computer Interface (BCI) to learn Metaverse users' expectations. By interpreting users' brain activities, our framework can optimize physical resources and enhance Quality-of-Experience (QoE) for users. To achieve this, we leverage a Wireless Edge Server (WES) to process electroencephalography (EEG) signals via uplink wire… ▽ More

    Submitted 8 October, 2024; v1 submitted 19 March, 2023; originally announced March 2023.

    Comments: arXiv admin note: text overlap with arXiv:2212.08811

  42. arXiv:2302.13445  [pdf, ps, other

    cs.NI cs.DC cs.LG

    Dynamic Resource Allocation for Metaverse Applications with Deep Reinforcement Learning

    Authors: Nam H. Chu, Diep N. Nguyen, Dinh Thai Hoang, Khoa T. Phan, Eryk Dutkiewicz, Dusit Niyato, Tao Shu

    Abstract: This work proposes a novel framework to dynamically and effectively manage and allocate different types of resources for Metaverse applications, which are forecasted to demand massive resources of various types that have never been seen before. Specifically, by studying functions of Metaverse applications, we first propose an effective solution to divide applications into groups, namely MetaInstan… ▽ More

    Submitted 26 February, 2023; originally announced February 2023.

    Comments: To be published in the Proceedings of the IEEE WCNC 2023

  43. arXiv:2302.02711  [pdf, other

    cs.LG eess.SY

    Network-Aided Intelligent Traffic Steering in 6G O-RAN: A Multi-Layer Optimization Framework

    Authors: Van-Dinh Nguyen, Thang X. Vu, Nhan Thanh Nguyen, Dinh C. Nguyen, Markku Juntti, Nguyen Cong Luong, Dinh Thai Hoang, Diep N. Nguyen, Symeon Chatzinotas

    Abstract: To enable an intelligent, programmable and multi-vendor radio access network (RAN) for 6G networks, considerable efforts have been made in standardization and development of open RAN (O-RAN). So far, however, the applicability of O-RAN in controlling and optimizing RAN functions has not been widely investigated. In this paper, we jointly optimize the flow-split distribution, congestion control and… ▽ More

    Submitted 29 May, 2023; v1 submitted 6 February, 2023; originally announced February 2023.

    Comments: 15 pages, 10 figures. A short version will be submitted to IEEE GLOBECOM 2023

  44. arXiv:2302.00207  [pdf, other

    cs.LG cs.DC cs.NI

    Distributed Traffic Synthesis and Classification in Edge Networks: A Federated Self-supervised Learning Approach

    Authors: Yong Xiao, Rong Xia, Yingyu Li, Guangming Shi, Diep N. Nguyen, Dinh Thai Hoang, Dusit Niyato, Marwan Krunz

    Abstract: With the rising demand for wireless services and increased awareness of the need for data protection, existing network traffic analysis and management architectures are facing unprecedented challenges in classifying and synthesizing the increasingly diverse services and applications. This paper proposes FS-GAN, a federated self-supervised learning framework to support automatic traffic analysis an… ▽ More

    Submitted 31 January, 2023; originally announced February 2023.

    Comments: published as early access at IEEE Transactions on Mobile Computing, January 2023

  45. Time-sensitive Learning for Heterogeneous Federated Edge Intelligence

    Authors: Yong Xiao, Xiaohan Zhang, Guangming Shi, Marwan Krunz, Diep N. Nguyen, Dinh Thai Hoang

    Abstract: Real-time machine learning has recently attracted significant interest due to its potential to support instantaneous learning, adaptation, and decision making in a wide range of application domains, including self-driving vehicles, intelligent transportation, and industry automation. We investigate real-time ML in a federated edge intelligence (FEI) system, an edge computing system that implements… ▽ More

    Submitted 26 January, 2023; originally announced January 2023.

    Comments: IEEE Link: https://ieeexplore.ieee.org/document/10018200

    Journal ref: IEEE Transactions on Mobile Computing, January 2023

  46. arXiv:2212.13390  [pdf, other

    eess.SY cs.NI

    Hierarchical Deep Reinforcement Learning for Age-of-Information Minimization in IRS-aided and Wireless-powered Wireless Networks

    Authors: Shimin Gong, Leiyang Cui, Bo Gu, Bin Lyu, Dinh Thai Hoang, Dusit Niyato

    Abstract: In this paper, we focus on a wireless-powered sensor network coordinated by a multi-antenna access point (AP). Each node can generate sensing information and report the latest information to the AP using the energy harvested from the AP's signal beamforming. We aim to minimize the average age-of-information (AoI) by adapting the nodes' transmission scheduling and the transmission control strategie… ▽ More

    Submitted 27 December, 2022; originally announced December 2022.

    Comments: 31 pages, 6 figures, 2 tables, 3 algorithms

  47. arXiv:2212.08811  [pdf, other

    eess.SP cs.NI

    Toward BCI-enabled Metaverse: A Joint Learning and Resource Allocation Approach

    Authors: Nguyen Quang Hieu, Dinh Thai Hoang, Diep N. Nguyen, Eryk Dutkiewicz

    Abstract: Toward user-driven Metaverse applications with fast wireless connectivity and tremendous computing demand through future 6G infrastructures, we propose a Brain-Computer Interface (BCI) enabled framework that paves the way for the creation of intelligent human-like avatars. Our approach takes a first step toward the Metaverse systems in which the digital avatars are envisioned to be more intelligen… ▽ More

    Submitted 31 August, 2023; v1 submitted 17 December, 2022; originally announced December 2022.

  48. arXiv:2211.07166  [pdf, other

    cs.LG cs.CR cs.DC

    Optimal Privacy Preserving for Federated Learning in Mobile Edge Computing

    Authors: Hai M. Nguyen, Nam H. Chu, Diep N. Nguyen, Dinh Thai Hoang, Van-Dinh Nguyen, Minh Hoang Ha, Eryk Dutkiewicz, Marwan Krunz

    Abstract: Federated Learning (FL) with quantization and deliberately added noise over wireless networks is a promising approach to preserve user differential privacy (DP) while reducing wireless resources. Specifically, an FL process can be fused with quantized Binomial mechanism-based updates contributed by multiple users. However, optimizing quantization parameters, communication resources (e.g., transmit… ▽ More

    Submitted 20 May, 2023; v1 submitted 14 November, 2022; originally announced November 2022.

    Comments: 16 pages, 10 figures

  49. arXiv:2209.14520  [pdf, other

    cs.LG cs.AI

    Label driven Knowledge Distillation for Federated Learning with non-IID Data

    Authors: Minh-Duong Nguyen, Quoc-Viet Pham, Dinh Thai Hoang, Long Tran-Thanh, Diep N. Nguyen, Won-Joo Hwang

    Abstract: In real-world applications, Federated Learning (FL) meets two challenges: (1) scalability, especially when applied to massive IoT networks; and (2) how to be robust against an environment with heterogeneous data. Realizing the first problem, we aim to design a novel FL framework named Full-stack FL (F2L). More specifically, F2L utilizes a hierarchical network architecture, making extending the FL… ▽ More

    Submitted 29 September, 2022; v1 submitted 28 September, 2022; originally announced September 2022.

    Comments: 28 pages, 5 figures, 10 tables

    MSC Class: 19A22 ACM Class: I.2.11

  50. When Virtual Reality Meets Rate Splitting Multiple Access: A Joint Communication and Computation Approach

    Authors: Nguyen Quang Hieu, Diep N. Nguyen, Dinh Thai Hoang, Eryk Dutkiewicz

    Abstract: Rate Splitting Multiple Access (RSMA) has emerged as an effective interference management scheme for applications that require high data rates. Although RSMA has shown advantages in rate enhancement and spectral efficiency, it has yet not to be ready for latency-sensitive applications such as virtual reality streaming, which is an essential building block of future 6G networks. Unlike conventional… ▽ More

    Submitted 25 July, 2022; originally announced July 2022.

    Report number: https://ieeexplore.ieee.org/document/10033423

    Journal ref: IEEE Journal on Selected Areas in Communications, 2023