Where Are the Red Lines? Towards Ethical Server-Side Scans in Security and Privacy Research
Primary research area.
- Empirical and Behavioral Security
Name of Conference
Usage metrics.
Help | Advanced Search
Computer Science > Machine Learning
Title: survey of graph neural network for internet of things and nextg networks.
Abstract: The exponential increase in Internet of Things (IoT) devices coupled with 6G pushing towards higher data rates and connected devices has sparked a surge in data. Consequently, harnessing the full potential of data-driven machine learning has become one of the important thrusts. In addition to the advancement in wireless technology, it is important to efficiently use the resources available and meet the users' requirements. Graph Neural Networks (GNNs) have emerged as a promising paradigm for effectively modeling and extracting insights which inherently exhibit complex network structures due to its high performance and accuracy, scalability, adaptability, and resource efficiency. There is a lack of a comprehensive survey that focuses on the applications and advances GNN has made in the context of IoT and Next Generation (NextG) networks. To bridge that gap, this survey starts by providing a detailed description of GNN's terminologies, architecture, and the different types of GNNs. Then we provide a comprehensive survey of the advancements in applying GNNs for IoT from the perspective of data fusion and intrusion detection. Thereafter, we survey the impact GNN has made in improving spectrum awareness. Next, we provide a detailed account of how GNN has been leveraged for networking and tactical systems. Through this survey, we aim to provide a comprehensive resource for researchers to learn more about GNN in the context of wireless networks, and understand its state-of-the-art use cases while contrasting to other machine learning approaches. Finally, we also discussed the challenges and wide range of future research directions to further motivate the use of GNN for IoT and NextG Networks.
Submission history
Access paper:.
- HTML (experimental)
- Other Formats
References & Citations
- Google Scholar
- Semantic Scholar
BibTeX formatted citation
Bibliographic and Citation Tools
Code, data and media associated with this article, recommenders and search tools.
- Institution
arXivLabs: experimental projects with community collaborators
arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.
Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.
Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .
What a lovely hat
Is it made out of tin foil .
International Association for Cryptologic Research
- General About CryptoDB Report errors
- Publications Awards Invited talks/papers By year By venue With video Acceptance rates BibTeX
- People Most publications Coauthor statistics All Program committees Most Program committees
IMAGES
VIDEO
COMMENTS
Text generation has become more accessible than ever, and the increasing interest in these systems, especially those using large language models, has spurred an increasing number of related publications. We provide a systematic literature review comprising 244 selected papers between 2017 and 2024. This review categorizes works in text generation into five main tasks: open-ended text ...
This paper examines the effects of introducing SRL strategies into an undergraduate introductory physics classroom. ... PAs are effective scaffolders of SRL with more research needed to understand their role as teachers of SRL. ... BibTeX Format. @article{osti_10511058, place = {Country unknown/Code not available}, title = {Adding self ...
International Association for Cryptologic Research International Association for Cryptologic Research. IACR. Events. All IACR events. ... Awards Invited talks/papers By year By venue With video Acceptance rates BibTeX. ... BibTeX. @inproceedings{crypto-2024-34316, title={Probabilistic Linearization: Internal Differential Collisions in up to 6 ...
Non-malleable zero-knowledge (NMZK), originally introduced in the seminal work of Dolev, Dwork, and Naor (STOC 91), is a fundamental concept for modeling the security of proof systems against man-in-the-middle attacks. Recently, Kim, Liang, and Pandey (CRYPTO 2022) presented the first efficient constant-round NMZK argument system based solely ...
International Association for Cryptologic Research International Association for Cryptologic Research. IACR. Events. All IACR events. ... This paper present Raccoon, a lattice-based signature scheme submitted to the NIST 2022 call for additional post-quantum signatures. ... BibTeX. @inproceedings{crypto-2024-34318, title={Raccoon: A Masking ...
International Association for Cryptologic Research International Association for Cryptologic Research. IACR. Events. All IACR events. ... Awards Invited talks/papers By year By venue With video Acceptance rates BibTeX. ... BibTeX. @inproceedings{crypto-2024-34236, title={Plaintext-Ciphertext Matrix Multiplication and FHE Bootstrapping: Fast and ...
In this paper, we address this research gap and investigate the boundaries of server-side scanning (3S) on the Web. To that end, we devise five typical scenarios for 3S on the Web to obtain concrete practical guidance. We analyze qualitative data from 23 interviews with legal experts, members of Research Ethics Committees, and website and ...
The exponential increase in Internet of Things (IoT) devices coupled with 6G pushing towards higher data rates and connected devices has sparked a surge in data. Consequently, harnessing the full potential of data-driven machine learning has become one of the important thrusts. In addition to the advancement in wireless technology, it is important to efficiently use the resources available and ...
International Association for Cryptologic Research International Association for Cryptologic Research. IACR. Events. All IACR events. ... In this paper, we propose a novel construction of a polynomial commitment scheme based on standard lattice-based assumptions. ... BibTeX. @inproceedings{crypto-2024-34291, title={Concretely Efficient Lattice ...
Some reference management software include support for automatic embedding and (re)formatting of references in Word processor programs. This table lists this type of support for Microsoft Word, Pages, Apache OpenOffice / LibreOffice Writer, the LaTeX editors Kile and LyX, and Google Docs. Other programs are able to scan RTF or other textual ...
CRYPTO 2024. Abstract: We provide the first attribute based encryption (ABE) scheme for Turing machines supporting unbounded collusions from lattice assumptions. In more detail, the encryptor encodes an attribute \vecx together with a bound t on the machine running time and a message m into the ciphertext, the key generator embeds a Turing ...
Google Scholar is a freely accessible web search engine that indexes the full text or metadata of scholarly literature across an array of publishing formats and disciplines. Released in beta in November 2004, the Google Scholar index includes peer-reviewed online academic journals and books, conference papers, theses and dissertations, preprints, abstracts, technical reports, and other ...
Authors: Yuyu Wang, University of Electronic Science and Technology of China Chuanjie Su, University of Electronic Science and Technology of China Jiaxin Pan, University of Kassel, Germany: Download: Search ePrint Search Google: Conference: CRYPTO 2024: Abstract: In this paper, we study multi-party non-interactive key ex-change (NIKE) in the fine-grained setting.