Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperAugust 2024
Poster: Combine Topology and Traffic to Calibrate P2P Botnet Identification in Large-Scale Network
ACM SIGCOMM Posters and Demos '24: Proceedings of the ACM SIGCOMM 2024 Conference: Posters and DemosPages 16–18https://doi.org/10.1145/3672202.3673720Cyber attacks are increasingly becoming prevalent and influence the Internet ecosystem. Particularly, botnets crafted by adversaries cause significant damage to Internet infrastructure. In the last decade, the boom of P2P protocols broadened and ...
- research-articleJune 2024
PolarStar: Expanding the Horizon of Diameter-3 Networks
SPAA '24: Proceedings of the 36th ACM Symposium on Parallelism in Algorithms and ArchitecturesPages 345–357https://doi.org/10.1145/3626183.3659975We present PolarStar, a novel family of diameter-3 network topologies derived from the star product of low-diameter factor graphs.
PolarStar gives the largest known diameter-3 network topologies for almost all radixes, thus providing the best known ...
- posterJuly 2024
Multi-Tree Network Protocol Enabling System Partitioning for Shape-Changeable Computer System
CF '24: Proceedings of the 21st ACM International Conference on Computing FrontiersPages 316–317https://doi.org/10.1145/3649153.3652995Shape-changeable computer system is proposed as a system that forms various shapes by communicating wirelessly with many adjacent chips. A network that supports diverse shapes and dynamic chip replacement is important, and methods for constructing ad-hoc ...
- research-articleNovember 2023
Topology analysis of the Ripple transaction network
International Journal of Network Management (IJNM), Volume 34, Issue 2https://doi.org/10.1002/nem.2253AbstractThe Ripple network is one typical blockchain‐based decentralized credit network, which supports money transfer without physical money movement by only transferring the credits between participants. It is critical to obtain a deep understanding ...
The topologies of two major categories of Ripple transactions, namely, direct payments and credit payments, have been analysed using diverse metrics. The findings reveal significant imbalances and concentrations within these networks, where a small ...
- research-articleAugust 2023
Investigating Impact of Fake-Type Content Poisoning Attack on NDN
ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and SecurityArticle No.: 85, Pages 1–10https://doi.org/10.1145/3600160.3605056Information-centric networking (ICN) has been widely studied as a new network architecture for efficient content delivery. However, the threat of content poisoning attack (CPA) has been pointed out. In the CPA, a malicious user degrades the cache hit ...
-
- research-articleJune 2023
Less Fragmented but Highly Centralized: A Bibliometric Analysis of Research in Computational Social Science
Social Science Computer Review (SSCR), Volume 41, Issue 3Pages 946–966https://doi.org/10.1177/08944393211058112Since its inception, computational social science (CSS) has been characterized as an interdisciplinary field. Nevertheless, unlike a mature interdisciplinary field that duly integrates knowledge beyond disciplinary boundaries, CSS has arguably been ...
- research-articleMay 2023
Decentralized Learning Made Easy with DecentralizePy
EuroMLSys '23: Proceedings of the 3rd Workshop on Machine Learning and SystemsPages 34–41https://doi.org/10.1145/3578356.3592587Decentralized learning (DL) has gained prominence for its potential benefits in terms of scalability, privacy, and fault tolerance. It consists of many nodes that coordinate without a central server and exchange millions of parameters in the ...
- research-articleDecember 2022
Topology and Geometry of the Third-Party Domains Ecosystem: Measurement and Applications
ACM SIGCOMM Computer Communication Review (SIGCOMM-CCR), Volume 52, Issue 4Pages 12–25https://doi.org/10.1145/3577929.3577932Over the years, web content has evolved from simple text and static images hosted on a single server to a complex, interactive and multimedia-rich content hosted on different servers. As a result, a modern website during its loading time fetches content ...
PolarFly: a cost-effective and flexible low-diameter topology
SC '22: Proceedings of the International Conference on High Performance Computing, Networking, Storage and AnalysisArticle No.: 12, Pages 1–15In this paper we present PolarFly, a diameter-2 network topology based on the Erdős-Rényi family of polarity graphs from finite geometry. This is the first known diameter-2 topology that asymptotically reaches the Moore bound on the number of nodes for ...
- research-articleJanuary 2023
Comparing Traditional and GAN-Based Approaches for the Synthesis of Wide Area Network Topologies
CNSM '22: Proceedings of the 18th International Conference on Network and Service ManagementArticle No.: 33, Pages 1–9Wide Area Network (WAN) research benefits from the availability of realistic network topologies, e. g., as input to simulations, emulators, or testbeds. With the rise of Machine Learning (ML) and particularly Deep Learning (DL) methods, this demand for ...
- research-articleOctober 2022
Revealing the evolution of a cloud provider through its network weather map
IMC '22: Proceedings of the 22nd ACM Internet Measurement ConferencePages 298–304https://doi.org/10.1145/3517745.3561462Researchers often face the lack of data on large operational networks to understand how they are used, how they behave, and sometimes how they fail. This data is crucial to drive the evolution of Internet protocols and develop techniques such as traffic ...
- research-articleOctober 2022
Exploiting user network topology and comment semantic for accurate rumour stance recognition on social media
Journal of Information Science (JIPP), Volume 48, Issue 5Pages 660–675https://doi.org/10.1177/0165551520977443Online social media (OSM) has become a hotbed for the rapid dissemination of disinformation or fake news. In order to recognise fake news and guide users of OSM, we focus on the stance recognition of comments, posted on OSM on the fake news-related ...
- research-articleSeptember 2022
Distributed Connectivity Control in Bio-Hybrid Wireless Sensor Networks
GoodIT '22: Proceedings of the 2022 ACM Conference on Information Technology for Social GoodPages 250–257https://doi.org/10.1145/3524458.3547260In the WatchPlant project, we aim to develop a bio-hybrid wireless sensor network (WSN) that uses natural plants as sensors for a variety of environmental conditions. One of the major challenges in such a system is managing connectivity while balancing ...
- research-articleAugust 2022
Connecting the Hosts: Street-Level IP Geolocation with Graph Neural Networks
KDD '22: Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data MiningPages 4121–4131https://doi.org/10.1145/3534678.3539049Pinpointing the geographic location of an IP address is important for a range of location-aware applications spanning from targeted advertising to fraud prevention. The majority of traditional measurement-based and recent learning-based methods either ...
- research-articleSeptember 2022
Partial copying and the role of diversity in social learning performance
One major way that people engage in adaptive problem solving is by imitating others’ solutions. Prominent simulation models have found imperfect imitation advantageous, but the interactions between copying amount and other prevalent aspects of social ...
- research-articleApril 2022
Graph Neural Networks Beyond Compromise Between Attribute and Topology
WWW '22: Proceedings of the ACM Web Conference 2022Pages 1127–1135https://doi.org/10.1145/3485447.3512069Although existing Graph Neural Networks (GNNs) based on message passing achieve state-of-the-art, the over-smoothing issue, node similarity distortion issue and dissatisfactory link prediction performance can’t be ignored. This paper summarizes these ...
- research-articleFebruary 2022
Identification of rumour stances by considering network topology and social media comments
Journal of Information Science (JIPP), Volume 48, Issue 1Pages 118–130https://doi.org/10.1177/0165551520944352Online social media (OSM) has become a hotbed for the rapid dissemination of disinformation or faked news. In order to track and limit the spread of faked news, we study stance identification of comments posted on OSM, where the stance can denote the ...
- research-articleJanuary 2022
Research on remote monitoring method of smart classroom based on internet of things
International Journal of Autonomous and Adaptive Communications Systems (IJAACS), Volume 15, Issue 3Pages 220–234https://doi.org/10.1504/ijaacs.2022.125417In view of the problems of insufficient security and poor user experience in traditional monitoring methods of smart classroom, a new remote monitoring scheme based on internet of things technology is proposed. In the hardware part, the remote monitoring ...
- research-articleDecember 2021
Improvement of Information Security of Monitoring Channels in Meteor-Burst Communication Networks of the Russian Arctic
Automatic Control and Computer Sciences (ACCS), Volume 55, Issue 8Pages 1142–1148https://doi.org/10.3103/S014641162108037XAbstractA procedure of quantitative assessment of monitoring security of the effectiveness of facilities in the vessel traffic management system along the Northern Sea Route is described using meteor-burst communication networks of the Russian Arctic.
- research-articleOctober 2021
GPU Parallelization of All-Pairs-Shortest-Path Algorithm in Low-Degree Unweighted Regular Graph
ACIT '21: Proceedings of the the 8th International Virtual Conference on Applied Computing & Information TechnologyPages 51–55https://doi.org/10.1145/3468081.3471122The design of the network topology of a large-scale parallel computer system can be represented as an order/degree problem in the graph theory. To solve the order/degree problem, we have to obtain all-pairs-shortest-path (APSP) for the graph. A ...