CISPA

Where Are the Red Lines? Towards Ethical Server-Side Scans in Security and Privacy Research

Primary research area.

  • Empirical and Behavioral Security

Name of Conference

Usage metrics.

CC BY 4.0

Help | Advanced Search

Computer Science > Machine Learning

Title: survey of graph neural network for internet of things and nextg networks.

Abstract: The exponential increase in Internet of Things (IoT) devices coupled with 6G pushing towards higher data rates and connected devices has sparked a surge in data. Consequently, harnessing the full potential of data-driven machine learning has become one of the important thrusts. In addition to the advancement in wireless technology, it is important to efficiently use the resources available and meet the users' requirements. Graph Neural Networks (GNNs) have emerged as a promising paradigm for effectively modeling and extracting insights which inherently exhibit complex network structures due to its high performance and accuracy, scalability, adaptability, and resource efficiency. There is a lack of a comprehensive survey that focuses on the applications and advances GNN has made in the context of IoT and Next Generation (NextG) networks. To bridge that gap, this survey starts by providing a detailed description of GNN's terminologies, architecture, and the different types of GNNs. Then we provide a comprehensive survey of the advancements in applying GNNs for IoT from the perspective of data fusion and intrusion detection. Thereafter, we survey the impact GNN has made in improving spectrum awareness. Next, we provide a detailed account of how GNN has been leveraged for networking and tactical systems. Through this survey, we aim to provide a comprehensive resource for researchers to learn more about GNN in the context of wireless networks, and understand its state-of-the-art use cases while contrasting to other machine learning approaches. Finally, we also discussed the challenges and wide range of future research directions to further motivate the use of GNN for IoT and NextG Networks.

Submission history

Access paper:.

  • HTML (experimental)
  • Other Formats

license icon

References & Citations

  • Google Scholar
  • Semantic Scholar

BibTeX formatted citation

BibSonomy logo

Bibliographic and Citation Tools

Code, data and media associated with this article, recommenders and search tools.

  • Institution

arXivLabs: experimental projects with community collaborators

arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.

Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.

Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .

What a lovely hat

Is it made out of tin foil .

IACR logo

International Association for Cryptologic Research

  • General About CryptoDB Report errors
  • Publications Awards Invited talks/papers By year By venue With video Acceptance rates BibTeX
  • People Most publications Coauthor statistics All Program committees Most Program committees

Fine-Grained Non-Interactive Key-Exchange without Idealized Assumptions

IMAGES

  1. Bibliography management in LaTeX

    bibtex research paper

  2. Automatic BibTeX reference generation for paper writing : deeplearning

    bibtex research paper

  3. How can I get the bibtex file of refernces in a paper?

    bibtex research paper

  4. iyi Çamaşırlar yük how to write bibliography in latex jonglörlük Ağır kamyon astar

    bibtex research paper

  5. How to use the ACM SIGGRAPH / TOG LaTeX template

    bibtex research paper

  6. [Research Training] Submit Paper (LaTex with BibTex) to arXiv in Overleaf

    bibtex research paper

VIDEO

  1. Add a New Research Paper To Orchid By Utilizing A Bibtex File

  2. How to Cite References in BiBtex format in Over Leaf (LaTex Editor)

  3. Research paper writing using LaTeX Overleaf

  4. Paste BibTeX to add publications

  5. แปลง references จาก ChatGPT ไปใช้ใน EndNote และ BitTex

  6. Adding a reference with Bibtex

COMMENTS

  1. [2405.15604] Text Generation: A Systematic Literature Review of Tasks

    Text generation has become more accessible than ever, and the increasing interest in these systems, especially those using large language models, has spurred an increasing number of related publications. We provide a systematic literature review comprising 244 selected papers between 2017 and 2024. This review categorizes works in text generation into five main tasks: open-ended text ...

  2. Adding self-regulated learning instruction to an introductory physics

    This paper examines the effects of introducing SRL strategies into an undergraduate introductory physics classroom. ... PAs are effective scaffolders of SRL with more research needed to understand their role as teachers of SRL. ... BibTeX Format. @article{osti_10511058, place = {Country unknown/Code not available}, title = {Adding self ...

  3. Probabilistic Linearization: Internal Differential Collisions in up to

    International Association for Cryptologic Research International Association for Cryptologic Research. IACR. Events. All IACR events. ... Awards Invited talks/papers By year By venue With video Acceptance rates BibTeX. ... BibTeX. @inproceedings{crypto-2024-34316, title={Probabilistic Linearization: Internal Differential Collisions in up to 6 ...

  4. Black-Box (and Fast) Non-Malleable Zero Knowledge

    Non-malleable zero-knowledge (NMZK), originally introduced in the seminal work of Dolev, Dwork, and Naor (STOC 91), is a fundamental concept for modeling the security of proof systems against man-in-the-middle attacks. Recently, Kim, Liang, and Pandey (CRYPTO 2022) presented the first efficient constant-round NMZK argument system based solely ...

  5. Raccoon: A Masking-Friendly Signature Proven in the Probing Model

    International Association for Cryptologic Research International Association for Cryptologic Research. IACR. Events. All IACR events. ... This paper present Raccoon, a lattice-based signature scheme submitted to the NIST 2022 call for additional post-quantum signatures. ... BibTeX. @inproceedings{crypto-2024-34318, title={Raccoon: A Masking ...

  6. Plaintext-Ciphertext Matrix Multiplication and FHE Bootstrapping: Fast

    International Association for Cryptologic Research International Association for Cryptologic Research. IACR. Events. All IACR events. ... Awards Invited talks/papers By year By venue With video Acceptance rates BibTeX. ... BibTeX. @inproceedings{crypto-2024-34236, title={Plaintext-Ciphertext Matrix Multiplication and FHE Bootstrapping: Fast and ...

  7. Where Are the Red Lines? Towards Ethical Server-Side Scans in Security

    In this paper, we address this research gap and investigate the boundaries of server-side scanning (3S) on the Web. To that end, we devise five typical scenarios for 3S on the Web to obtain concrete practical guidance. We analyze qualitative data from 23 interviews with legal experts, members of Research Ethics Committees, and website and ...

  8. [2405.17309] Survey of Graph Neural Network for Internet of Things and

    The exponential increase in Internet of Things (IoT) devices coupled with 6G pushing towards higher data rates and connected devices has sparked a surge in data. Consequently, harnessing the full potential of data-driven machine learning has become one of the important thrusts. In addition to the advancement in wireless technology, it is important to efficiently use the resources available and ...

  9. Concretely Efficient Lattice-based Polynomial Commitment from Standard

    International Association for Cryptologic Research International Association for Cryptologic Research. IACR. Events. All IACR events. ... In this paper, we propose a novel construction of a polynomial commitment scheme based on standard lattice-based assumptions. ... BibTeX. @inproceedings{crypto-2024-34291, title={Concretely Efficient Lattice ...

  10. Comparison of reference management software

    Some reference management software include support for automatic embedding and (re)formatting of references in Word processor programs. This table lists this type of support for Microsoft Word, Pages, Apache OpenOffice / LibreOffice Writer, the LaTeX editors Kile and LyX, and Google Docs. Other programs are able to scan RTF or other textual ...

  11. Attribute Based Encryption for Turing Machines from Lattices

    CRYPTO 2024. Abstract: We provide the first attribute based encryption (ABE) scheme for Turing machines supporting unbounded collusions from lattice assumptions. In more detail, the encryptor encodes an attribute \vecx together with a bound t on the machine running time and a message m into the ciphertext, the key generator embeds a Turing ...

  12. Google Scholar

    Google Scholar is a freely accessible web search engine that indexes the full text or metadata of scholarly literature across an array of publishing formats and disciplines. Released in beta in November 2004, the Google Scholar index includes peer-reviewed online academic journals and books, conference papers, theses and dissertations, preprints, abstracts, technical reports, and other ...

  13. Fine-Grained Non-Interactive Key-Exchange without Idealized Assumptions

    Authors: Yuyu Wang, University of Electronic Science and Technology of China Chuanjie Su, University of Electronic Science and Technology of China Jiaxin Pan, University of Kassel, Germany: Download: Search ePrint Search Google: Conference: CRYPTO 2024: Abstract: In this paper, we study multi-party non-interactive key ex-change (NIKE) in the fine-grained setting.