GL

G. Lan

23 records found

Gaze estimation systems powered by deep neural networks are commonly used in sensitive applications such as driver assist or human-computer interaction. While backdoor attacks have been widely studied for classification tasks, vulnerability of regression networks like gaze estima ...

Stress Testing Open5GS UPF Implementation

Measuring resource consumption and latency in virtual environment

The global adoption of 5G technology is rapidly accelerating and 5G traffic is growing exponentially. This increase in demand compels network operators to evaluate whether their current and upcoming 5G infrastructure can effectively accommodate the growing data traffic. A key com ...

Traffic analysis and forecasting for adaptive network resource management in 5G/6G networks

Comparison of machine learning models for predicting near-future traffic demand

With the exponential growth of mobile traffic in 5G networks, accurate forecasting is essential for efficient resource management. This research provides a comparative analysis of time series forecasting models for predicting near-future network traffic. Using a public dataset fr ...
Academic research in 5G networking faces a lack of accessible, realistic packet-level datasets, limiting innovation and reproducibility. This paper evaluates two state-of-the-art machine learning approaches, PAC-GAN and TabularARGN, for generating synthetic 5G TCP/IP packet heade ...
Modern mobile networks must adapt to rapidly changing traffic patterns and increasing user demands. A key challenge is understanding where user traffic terminates and how these destinations vary over time. This thesis addresses this challenge by introducing an open-source, modula ...

Traffic analysis and forecasting for adaptive network resource management in 5G/6G networks

Adaptability and Latency in Network Reconfigurations of Virtualized Network Functions in 5G Networks

This paper investigates the latency and resilience of user-plane anchor reconfiguration in a fully virtualized 5G core environment using Open5GS and UERANSIM. The experiment spans five VirtualBox virtual machines, each hosting a key component of the 5G core or radio stack: 5G-cor ...
Optical flow estimation with event cameras encompasses two primary algorithm classes: model-based and learning-based methods. Model-based approaches, do not require any training data while learning-based approaches utilize datasets of events to train neural networks. To effective ...
Event cameras are bio-inspired sensors with high dynamic range, high temporal resolution, and low power consumption. These features enable precise motion detection even in challenging lighting conditions and fast-changing scenes, rendering them well-suited for optical flow estima ...
Computer vision tasks have shown to benefit greatly from both developments in deep learning networks, and the emergence of event cameras. Deep networks can require a large amount of training data, which is not readily available for event cameras, specifically for optical flow est ...

Performance of outlier detection on smartwatch data in single and multiple person environments

An analysis of the performance of different outlier detection methods on consumer-grade wearable data in environments with single and multiple subjects

Outlier detection is an essential part of modern systems. It is used to detect anomalies in behaviour or performance of systems or subjects, such as fall detection in smartwatches or voltage irregularity detection in batteries. This provides early indications of something of pote ...

Person identification using heart rate and activity from consumer-grade wearables

How do different types of cardiac diagnosis affect the accuracy of Deep Neural Networks to identify individuals by their heart rate?

Advancements in the precision and accuracy of consumer-grade wearables, such as a Fitbit, have enabled the identification and therefore authentication of individuals based on their emitted heart frequencies using these wrist-worn devices. With this type of authentication, a passw ...
Heart rate data and other data collected by consumer-grade wearable devices can give away quite useful information about the user. It can for example be used by machine learning algorithms such as Deep Neural Networks (DNN) to learn patterns about cardiovascular disease and fitne ...
The aim of this paper is to complete the gap in the knowledge and experiment using as little as only the heart rate of some subjects to manage to successfully authorise them in some supposed system. The focus will be on the Gaussian Mixture model and the One Class Support Vector ...
In recent years, with the rapid expansion of IoT (Internet of Things) devices, more and more research and commercial projects have focused on various application areas of IoT. Signify, as a leading player in the smart home industry, has been deeply involved in this field for many ...
Badnets are a type of backdoor attack that aims at manipulating the behavior of Convolutional Neural Networks. The training is modified such that when certain triggers appear in the inputs the CNN is going to behave accordingly. In this paper, we apply this type of backdoor attac ...
Recent years have seen an increasing interest in stablecoins from major corporate and governmental parties. The European Central Bank is investigating the possibility of introducing its own Central Bank Digital Currency. The desired features of such a currency are under discussio ...
Model extraction attacks are attacks which generate a substitute model of a targeted victim neural network. It is possible to perform these attacks without a preexisting dataset, but doing so requires a very high number of queries to be sent to the victim model. This is otfen in ...
Adversarial training and its variants have become the standard defense against adversarial attacks - perturbed inputs designed to fool the model. Boosting techniques such as Adaboost have been successful for binary classification problems, however, there is limited research in th ...

Black-box Adversarial Attacks using Substitute models

Effects of Data Distributions on Sample Transferability

Machine Learning (ML) models are vulnerable to adversarial samples — human imperceptible changes to regular input to elicit wrong output on a given model. Plenty of adversarial attacks assume an attacker has access to the underlying model or access to the data used to train the m ...
A machine learning classifier can be tricked us- ing adversarial attacks, attacks that alter images slightly to make the target model misclassify the image. To create adversarial attacks on black-box classifiers, a substitute model can be created us- ing model stealing. The resea ...