Circular Image

Q. Wang

35 records found

Trust in network nodes

Implementation of secure communication and data storage using a post-quantum encryption algorithm and signature scheme with a blockchain environment

The development of quantum computing poses a significant threat to currently deployed cryptographic primitives. To address this challenge, we design and implement a system to communicate and store data using post-quantum secure algorithms for a distributed blockchain environment ...

HARSH but Subtle

Horizontal semAntic Robust Stealthy Backdoor with High-fidelity, context-aware triggers

Optimized Small Cell Selection for Minimizing Power Consumption in 5G Radio Access Network

Enabling Energy-Efficient Operation in 5G Radio Access Networks

The energy consumption of mobile networks, particularly the 5G Radio Access Network (RAN), is becoming a growing concern due to its environmental and economic implications. As the demand for higher data rates and low-latency services intensifies, 5G networks, integrating macro ce ...
With the rapid development of industrial systems, the demand for stability, reliability, and robustness has become increasingly critical. Fault detection has emerged as a key research area, aiming to prevent unexpected failures and performance degradation. Recent advances in feat ...
Microcontroller-based neural network inference faces significant RAM constraints, hindering performance and deployment. One of the main constraints is the peak memory usage, which is essential for conducting deep learning inferences with low latency. To address this, previous res ...
The sixth generation (6G) of mobile networks promises transformative capabilities in terms of, amount others, higher data rates, lower latency and ubiquitous coverage, but achieving these goals sustainably poses significant challenges. A promising solution lies in Cell-Free massi ...

Capturing the Spatiotemporal Dynamics of LEO ISP Performance

Spatiotemporal Forecasting of Starlink Connectivity: A Data-Driven, Weather-Aware Approach

We present a machine learning framework aimed at forecasting Starlink (LEO satellite) network performance at fine spatiotemporal resolution. Our approach combines MLab crowdsourced measurements, weather and forecast features, and dynamic satellite density to predict packet loss, ...

Multi-Layered Telemetry Assessing Global Performance of LEO Internet Providers

Towards a Global Telemetry System for Evaluating LEO ISP Performance

The rise of Low-Earth-Orbit (LEO) satellite networks, such as Starlink, has transformed global connectivity, enabling high-speed internet access in previously underserved regions. However, existing research lacks a unified framework to evaluate and compare the performance of LEO ...

Multi-Layered Telemetry Assessing Global Performance of LEO Internet Providers

Enhancing LEO Internet Providers Telemetry with User-Initiated Active Measurements

Low Earth Orbit (LEO) satellite constellations, particularly SpaceX’s Starlink, have quickly gained popularity and have become a viable alternative to traditional terrestrial Internet Service Providers (ISPs) in recent years. However, due to their novelty and unique architecture, ...
Quantum computing holds the potential to solve problems that are intractable for classical systems. However, the physical realization of large-scale quantum systems remains a challenge due to the difficulty of scaling qubit counts. Distributed Quantum Computing (DQC) offers a pro ...
Gunshot detection plays a critical role in protecting African wildlife and reducing illegal poaching activities. The decline of keystone species disrupts ecosystems and inhibits forest CO₂ absorption, contributing to climate change. To support conservation efforts, this thesis co ...
Recommender systems are widely used in modern lives and contribute to many industries. Therefore, methods to evaluate and improve them are important. Nowadays, much research has been done to improve the system aspects such as algorithms. However, user experiences are not only aff ...
Federated Learning (FL) is a distributed machine learning approach that enhances data privacy by training models across multiple devices or servers without centralizing raw data. Traditional FL frameworks, which rely on synchronous updates and homogeneous resources, face signific ...
Visible Light Communication (VLC) leverages the visible light spectrum to establish wireless communication, offering advantages such as broader bandwidth, and reduced energy consumption compared to traditional radio frequency methods. VLC offers two main approaches: passive and a ...
Federated Learning has gained prominence in recent years, in no small part due to its ability to train Machine Learning models with data from users' devices whilst keeping this data private. Decentralized Federated Learning (DFL) is a branch of Federated Learning (FL) that deals ...

Fast Simulation of Federated and Decentralized Learning Algorithms

Scheduling Algorithms for Minimisation of Variability in Federated Learning Simulations

Federated Learning (FL) systems often suffer from high variability in the final model due to inconsistent training across distributed clients. This paper identifies the problem of high variance in models trained through FL and proposes a novel approach to mitigate this issue thro ...

Improving the Accuracy of Federated Learning Simulations

Using Traces from Real-world Deployments to Enhance the Realism of Simulation Environments

Federated learning (FL) is a machine learning paradigm where private datasets are distributed among decentralized client devices and model updates are communicated and aggregated to train a shared global model. While providing privacy and scalability benefits, FL systems also fac ...
Federated Learning is a machine learning paradigm where the computational load for training the model on the server is distributed amongst a pool of clients who only exchange model parameters with the server. Simulation environments try to accurately model all the intricacies of ...
Threshold signatures play a crucial role in the security of blockchain applications. An efficient threshold signature can be applied to enhance the security of wallets and transactions by enforcing multi-device-based authentication, as this requires adversaries to compromise more ...
In the ever-evolving field of music technology, new solutions continue to emerge that enhance musical expression and creativity. This thesis introduces WaveTune, a novel lightweight hand gesture recognition system that enables real-time control of musical composition and performa ...