Tom H. Luan
YOU?
Author Swipe
View article: DTHA: A Digital Twin-Assisted Handover Authentication Scheme for 5G and Beyond
DTHA: A Digital Twin-Assisted Handover Authentication Scheme for 5G and Beyond Open
With the rapid development and extensive deployment of the fifth-generation wireless system (5G), it has achieved ubiquitous high-speed connectivity and improved overall communication performance. Additionally, as one of the promising tech…
View article: SPIN: Accelerating Large Language Model Inference with Heterogeneous Speculative Models
SPIN: Accelerating Large Language Model Inference with Heterogeneous Speculative Models Open
Speculative decoding has been shown as an effective way to accelerate Large Language Model (LLM) inference by using a Small Speculative Model (SSM) to generate candidate tokens in a so-called speculation phase, which are subsequently verif…
View article: STMDNet: A Lightweight Directional Framework for Motion Pattern Recognition of Tiny Targets
STMDNet: A Lightweight Directional Framework for Motion Pattern Recognition of Tiny Targets Open
Recognizing motions of tiny targets - only few dozen pixels - in cluttered backgrounds remains a fundamental challenge when standard feature-based or deep learning methods fail under scarce visual cues. We propose STMDNet, a model-based co…
View article: Internet of Agents: Fundamentals, Applications, and Challenges
Internet of Agents: Fundamentals, Applications, and Challenges Open
With the rapid proliferation of large language models and vision-language models, AI agents have evolved from isolated, task-specific systems into autonomous, interactive entities capable of perceiving, reasoning, and acting without human …
View article: RevPRAG: Revealing Poisoning Attacks in Retrieval-Augmented Generation through LLM Activation Analysis
RevPRAG: Revealing Poisoning Attacks in Retrieval-Augmented Generation through LLM Activation Analysis Open
View article: Movable Antennas Enabled ISAC Systems: Fundamentals, Opportunities, and Future Directions
Movable Antennas Enabled ISAC Systems: Fundamentals, Opportunities, and Future Directions Open
The movable antenna (MA)-enabled integrated sensing and communication (ISAC) system attracts widespread attention as an innovative framework. The ISAC system integrates sensing and communication functions, achieving resource sharing across…
View article: RevPRAG: Revealing Poisoning Attacks in Retrieval-Augmented Generation through LLM Activation Analysis
RevPRAG: Revealing Poisoning Attacks in Retrieval-Augmented Generation through LLM Activation Analysis Open
Retrieval-Augmented Generation (RAG) enriches the input to LLMs by retrieving information from the relevant knowledge database, enabling them to produce responses that are more accurate and contextually appropriate. It is worth noting that…
View article: AI-Native Network Digital Twin for Intelligent Network Management in 6G
AI-Native Network Digital Twin for Intelligent Network Management in 6G Open
As a pivotal virtualization technology, network digital twin is expected to accurately reflect real-time status and abstract features in the on-going sixth generation (6G) networks. In this article, we propose an artificial intelligence (A…
View article: Large Model Based Agents: State-of-the-Art, Cooperation Paradigms, Security and Privacy, and Future Trends
Large Model Based Agents: State-of-the-Art, Cooperation Paradigms, Security and Privacy, and Future Trends Open
With the rapid advancement of large models (LMs), the development of general-purpose intelligent agents powered by LMs has become a reality. It is foreseeable that in the near future, LM-driven general AI agents will serve as essential too…
View article: A Secure and Lightweight Data Sharing Scheme in Vehicular Digital Twin Network
A Secure and Lightweight Data Sharing Scheme in Vehicular Digital Twin Network Open
The vehicular digital twin network (VDTN) comprises digital twins (DTs) that enable seamless communication and data transmission. This network effectively maps the Internet of Vehicles (IoV) into cyberspace, facilitating stable and efficie…
View article: Toward Enhanced Reinforcement Learning-Based Resource Management via Digital Twin: Opportunities, Applications, and Challenges
Toward Enhanced Reinforcement Learning-Based Resource Management via Digital Twin: Opportunities, Applications, and Challenges Open
This article presents a digital twin (DT)-enhanced reinforcement learning (RL) framework aimed at optimizing performance and reliability in network resource management, since the traditional RL methods face several unified challenges when …
View article: A Survey on Semantic Communication Networks: Architecture, Security, and Privacy
A Survey on Semantic Communication Networks: Architecture, Security, and Privacy Open
With the rapid advancement and deployment of intelligent agents and artificial general intelligence (AGI), a fundamental challenge for future networks is enabling efficient communications among agents. Unlike traditional human-centric, dat…
View article: Guest Editorial Special Issue on Internet of Things for Smart Ocean
Guest Editorial Special Issue on Internet of Things for Smart Ocean Open
The Internet of Things (IoT) for smart ocean is a promising paradigm that will support emerging applications in the areas of maritime transport, emergency search and rescue, security and border surveillance, environmental protection, etc. …
View article: Guest Editorial Special Issue on Internet of Things for Smart Ocean
Guest Editorial Special Issue on Internet of Things for Smart Ocean Open
The Internet of Things (IoT) for smart ocean is a promising paradigm that will support emerging applications in the areas of maritime transport, emergency search and rescue, security and border surveillance, environmental protection, etc. …
View article: Secured and Cooperative Publish/Subscribe Scheme in Autonomous Vehicular Networks
Secured and Cooperative Publish/Subscribe Scheme in Autonomous Vehicular Networks Open
In order to save computing power yet enhance safety, there is a strong intention for autonomous vehicles (AVs) in future to drive collaboratively by sharing sensory data and computing results among neighbors. However, the intense collabora…
View article: A Simulation Method for Offshore Inclined Cylinder Under the Coupling Loads of Wind, Wave and Earthquake
A Simulation Method for Offshore Inclined Cylinder Under the Coupling Loads of Wind, Wave and Earthquake Open
View article: Learning Decentralized Traffic Signal Controllers with Multi-Agent Graph Reinforcement Learning
Learning Decentralized Traffic Signal Controllers with Multi-Agent Graph Reinforcement Learning Open
This paper considers optimal traffic signal control in smart cities, which has been taken as a complex networked system control problem. Given the interacting dynamics among traffic lights and road networks, attaining controller adaptivity…
View article: Imperfect Digital Twin Assisted Low Cost Reinforcement Training for Multi-UAV Networks
Imperfect Digital Twin Assisted Low Cost Reinforcement Training for Multi-UAV Networks Open
Deep Reinforcement Learning (DRL) is widely used to optimize the performance of multi-UAV networks. However, the training of DRL relies on the frequent interactions between the UAVs and the environment, which consumes lots of energy due to…
View article: Label-free Deep Learning Driven Secure Access Selection in Space-Air-Ground Integrated Networks
Label-free Deep Learning Driven Secure Access Selection in Space-Air-Ground Integrated Networks Open
In Space-air-ground integrated networks (SAGIN), the inherent openness and extensive broadcast coverage expose these networks to significant eavesdropping threats. Considering the inherent co-channel interference due to spectrum sharing am…
View article: Scalable Resource Management for Dynamic MEC: An Unsupervised Link-Output Graph Neural Network Approach
Scalable Resource Management for Dynamic MEC: An Unsupervised Link-Output Graph Neural Network Approach Open
Deep learning has been successfully adopted in mobile edge computing (MEC) to optimize task offloading and resource allocation. However, the dynamics of edge networks raise two challenges in neural network (NN)-based optimization methods: …
View article: A Survey on ChatGPT: AI-Generated Contents, Challenges, and Solutions
A Survey on ChatGPT: AI-Generated Contents, Challenges, and Solutions Open
With the widespread use of large artificial intelligence (AI) models such as ChatGPT, AI-generated content (AIGC) has garnered increasing attention and is leading a paradigm shift in content creation and knowledge representation. AIGC uses…
View article: SEAL: A Strategy-Proof and Privacy-Preserving UAV Computation Offloading Framework
SEAL: A Strategy-Proof and Privacy-Preserving UAV Computation Offloading Framework Open
Due to the limited battery and computing resource, offloading unmanned aerial vehicles (UAVs)' computation tasks to ground infrastructure, e.g., vehicles, is a fundamental framework. Under such an open and untrusted environment, vehicles a…
View article: From Wide to Deep: Dimension Lifting Network for Parameter-efficient Knowledge Graph Embedding
From Wide to Deep: Dimension Lifting Network for Parameter-efficient Knowledge Graph Embedding Open
Knowledge graph embedding (KGE) that maps entities and relations into vector representations is essential for downstream applications. Conventional KGE methods require high-dimensional representations to learn the complex structure of know…
View article: A Survey on Digital Twins: Architecture, Enabling Technologies, Security and Privacy, and Future Prospects
A Survey on Digital Twins: Architecture, Enabling Technologies, Security and Privacy, and Future Prospects Open
By interacting, synchronizing, and cooperating with its physical counterpart in real time, digital twin is promised to promote an intelligent, predictive, and optimized modern city. Via interconnecting massive physical entities and their v…
View article: A Survey on Digital Twins: Architecture, Enabling Technologies, Security and Privacy, and Future Prospects
A Survey on Digital Twins: Architecture, Enabling Technologies, Security and Privacy, and Future Prospects Open
By interacting, synchronizing, and cooperating with its physical counterpart in real time, digital twin is promised to promote an intelligent, predictive, and optimized modern city. Via interconnecting massive physical entities and their v…
View article: Trade Privacy for Utility: A Learning-Based Privacy Pricing Game in Federated Learning
Trade Privacy for Utility: A Learning-Based Privacy Pricing Game in Federated Learning Open
To prevent implicit privacy disclosure in sharing gradients among data owners (DOs) under federated learning (FL), differential privacy (DP) and its variants have become a common practice to offer formal privacy guarantees with low overhea…
View article: An Empirical Study on Model Pruning and Quantization
An Empirical Study on Model Pruning and Quantization Open
View article: A Survey on ChatGPT: AI–Generated Contents, Challenges, and Solutions
A Survey on ChatGPT: AI–Generated Contents, Challenges, and Solutions Open
With the widespread use of large artificial intelligence (AI) models such as ChatGPT, AI-generated content (AIGC) has garnered increasing attention and is leading a paradigm shift in content creation and knowledge representation. AIGC uses…
View article: Social-Aware Clustered Federated Learning with Customized Privacy Preservation
Social-Aware Clustered Federated Learning with Customized Privacy Preservation Open
A key feature of federated learning (FL) is to preserve the data privacy of end users. However, there still exist potential privacy leakage in exchanging gradients under FL. As a result, recent research often explores the differential priv…
View article: A Secure and Intelligent Data Sharing Scheme for UAV-Assisted Disaster Rescue
A Secure and Intelligent Data Sharing Scheme for UAV-Assisted Disaster Rescue Open
Unmanned aerial vehicles (UAVs) have the potential to establish flexible and reliable emergency networks in disaster sites when terrestrial communication infrastructures go down. Nevertheless, potential security threats may occur on UAVs d…