https://arxiv.org/api/Wf5la455wW8kctPB8NehB+m3crs 2026-03-20T14:06:33Z 26796 45 15 http://arxiv.org/abs/2409.17430v4 A Hierarchical Gradient Tracking Algorithm for Mitigating Subnet-Drift in Fog Learning Networks 2026-03-16T13:31:12Z Federated learning (FL) encounters scalability challenges when implemented over fog networks that do not follow FL's conventional star topology architecture. Semi-decentralized FL (SD-FL) has proposed a solution for device-to-device (D2D) enabled networks that divides model cooperation into two stages: at the lower stage, D2D communications is employed for local model aggregations within subnetworks (subnets), while the upper stage handles device-server (DS) communications for global model aggregations. However, existing SD-FL schemes are based on gradient diversity assumptions that become performance bottlenecks as data distributions become more heterogeneous. In this work, we develop semi-decentralized gradient tracking (SD-GT), the first SD-FL methodology that removes the need for such assumptions by incorporating tracking terms into device updates for each communication layer. Our analytical characterization of SD-GT reveals upper bounds on convergence for non-convex, convex, and strongly-convex problems. We show how the bounds enable the development of an optimization algorithm that navigates the performance-efficiency trade-off by tuning subnet sampling rate and D2D rounds for each global training interval. Our subsequent numerical evaluations demonstrate that SD-GT obtains substantial improvements in trained model quality and communication cost relative to baselines in SD-FL and gradient tracking on several datasets. 2024-09-25T23:38:12Z This paper is accepted to IEEE/ACM Transactions on Networking. arXiv admin note: text overlap with arXiv:2312.04728 Evan Chen Shiqiang Wang Christopher G. Brinton http://arxiv.org/abs/2603.15242v1 SliceMapper: Intelligent Mapping of O-CU and O-DU onto O-Cloud Sites in 6G O-RAN 2026-03-16T13:14:54Z In this paper, we propose an rApp, named SliceMapper, to optimize the mapping process of the open centralized unit (O-CU) and open distributed unit (O-DU) of an open radio access network (O-RAN) slice subnet onto the underlying open cloud (O-Cloud) sites in sixth-generation (6G) O-RAN. To accomplish this, we first design a system model for SliceMapper and introduce its mathematical framework. Next, we formulate the mapping process addressed by SliceMapper as a sequential decision-making optimization problem. To solve this problem, we implement both on-policy and off-policy variants of the Q-learning algorithm, employing tabular representation as well as function approximation methods for each variant. To evaluate the effectiveness of these approaches, we conduct a series of simulations under various scenarios. We proceed further by performing a comparative analysis of all four variants. The results demonstrate that the on-policy function approximation method outperforms the alternative approaches in terms of stability and lower standard deviation across all random seeds. However, the on-policy and off-policy tabular representation methods achieve higher average rewards, with values of 5.42 and 5.12, respectively. Finally, we conclude the paper and introduce several directions for future research. 2026-03-16T13:14:54Z Mohammad Asif Habibi Xavier Costa-Pérez Hans D. Schotten http://arxiv.org/abs/2603.15188v1 Joint Routing and Model Pruning for Decentralized Federated Learning in Bandwidth-Constrained Multi-Hop Wireless Networks 2026-03-16T12:25:27Z Decentralized federated learning (D-FL) enables privacy-preserving training without a central server, but multi-hop model exchanges and aggregation are often bottlenecked by communication resource constraints. To address this issue, we propose a joint routing-and-pruning framework that optimizes routing paths and pruning rates to maintain communication latency within prescribed limits. We analyze how the sum of model biases across all clients affects the convergence bound of D-FL and formulate an optimization problem that maximizes the model retention rate to minimize these biases under communication constraints. Further analysis reveals that each client's model retention rate is path-dependent, which reduces the original problem to a routing optimization. Leveraging this insight, we develop a routing algorithm that selects latency-efficient transmission paths, allowing more parameters to be delivered within the time budget and thereby improving D-FL convergence. Simulations demonstrate that, compared with unpruned systems, the proposed framework reduces average transmission latency by 27.8% and improves testing accuracy by approximately 12%. Furthermore, relative to standard benchmark routing algorithms, the proposed routing method improves accuracy by roughly 8%. 2026-03-16T12:25:27Z Xiaoyu He Weicai Li Tiejun Lv Xi Yu http://arxiv.org/abs/2603.12498v2 Keys on Doormats: Exposed API Credentials on the Web 2026-03-16T02:10:30Z Application programming interfaces (APIs) have become a central part of the modern IT environment, allowing developers to enrich the functionality of applications and interact with third parties such as cloud and payment providers. This interaction often occurs through authentication mechanisms that rely on sensitive credentials such as API keys and tokens that require secure handling. Exposure of these credentials can pose significant consequences to organizations, as malicious attackers can gain access to related services. Previous studies have shown exposure of these sensitive credentials in different environments such as cloud platforms and GitHub. However, the web remains unexplored. In this paper, we study exposure of credentials on the web by analyzing 10M webpages. Our findings reveal that API credentials are widely and publicly exposed on the web, including highly popular and critical webpages such as those of global banks and firmware developers. We identify 1,748 distinct credentials from 14 service providers (e.g., cloud and payment providers) across nearly 10,000 webpages. Moreover, our analysis of archived data suggest credentials to remain exposed for periods ranging from a month to several years. We characterize web-specific exposure vectors and root causes, finding that most originate from JavaScript environments. We also discuss the outcomes of our responsible disclosure efforts that demonstrated a substantial reduction in credential exposure on the web. 2026-03-12T22:31:37Z Nurullah Demir Stanford University Yash Vekaria University of California, Davis Georgios Smaragdakis Stanford University TU Delft Zakir Durumeric Stanford University http://arxiv.org/abs/2603.14661v1 AtlasRAN: Modeling and Performance Evaluation of Open 5G Platforms for Ubiquitous Wireless Networks 2026-03-15T23:34:49Z Fifth-generation (5G) systems are increasingly studied as shared communication and computing infrastructure for connected vehicles, roadside edge platforms, and future unmanned-system applications. Yet results from simulators, host-OS emulators, digital twins, and hardware-in-the-loop testbeds are often compared as if timing, input/output (I/O), and control-loop behavior were equivalent across them. They are not. Consequently, apparent limits in throughput, latency, scalability, or real-time behavior may reflect the execution harness rather than the wireless design itself. This paper presents \textit{AtlasRAN}, a capability-oriented framework for modeling and performance evaluation of 5G Open Radio Access Network (O-RAN) platforms. It introduces two reference architectures, terminology that separates functional compatibility from timing fidelity, and a capability matrix that maps research questions to evaluation environments that can support them credibly. O-RAN is used here as an experimental coordinate system spanning Centralized Unit (CU)/Distributed Unit (DU) partitioning, fronthaul transport, control exposure, and core-network anchoring. We validate \textit{AtlasRAN} through a CU-DU uplink load study on a coherent CPU-GPU edge platform. For both a CPU-only baseline and a GPU-accelerated low-density parity-check decoding variant, aggregate goodput drops sharply as user count rises from 1 to 12, while fairness remains near ideal and compute utilization decreases rather than increases. This pattern indicates time-scale dilation and online I/O starvation in the emulation harness, not decoder saturation, as the dominant scaling limit. The key lesson is that timing, memory, and transport semantics must be reported as first-class experimental variables when evaluating ubiquitous 5G infrastructure. 2026-03-15T23:34:49Z 17 pages, 4 figures, 3 tables Ryan Barker Tolunay Seyfi Alireza Ebrahimi Dorcheh Julia Boone Fatemeh Afghah Joseph Boccuzzi http://arxiv.org/abs/2603.14551v1 An Analytic Hierarchy Process (AHP) Based QoS-aware Mode Selection Algorithm for D2D Enabled Heterogeneous Networks 2026-03-15T18:57:33Z Device-to-device (D2D) communication was proposed to enhance the coverage of cellular base stations. In a D2D enabled non-standalone fifth generation cellular network (NSA), service demand of a user equipment (UE) may be served in four \emph{modes}: through LTE only, through NR only, through LTE via D2D and through NR via D2D. Such mode selection should consider the service requirements of the UEs (e.g., high data rate, low latency, ultra-reliability, etc.) and the overhead incurred by handovers. In existing mode selection approaches for D2D enabled NSA, the service requirements of the UEs have been largely ignored. To address this, in this paper, we propose a mode selection algorithm for D2D enabled NSA based on a two-level Analytic Hierarchy Process (AHP). The proposed AHP-based mechanism considers the service requirements of the UEs in level 1; and mode selection options (i.e., LTE only, NR only, LTE via D2D and NR via D2D) in level 2. Thereafter, a novel mode selection algorithm is proposed by combining the static ranking computed by the proposed two-level AHP and the variation of Reference Signal Received Power (RSRP) in different modes, thus capturing the impact of UE mobility and reducing unnecessary handovers. Simulation results show that our proposed algorithm outperforms the best performing related work in terms of the major Key performance indicators (KPIs) for all three slices, i.e., enhanced mobile broadband (eMBB), ultra reliable low latency (uRLLc) and massive machine type communications (mMTc). 2026-03-15T18:57:33Z Souvik Deb Shankar K. Ghosh Avirup Das Sridevi S Jacob Augustine Rajib Mall http://arxiv.org/abs/2509.19503v2 InterQnet: A Heterogeneous Full-Stack Approach to Co-designing Scalable Quantum Networks 2026-03-15T16:13:10Z Quantum communications have progressed significantly, moving from a theoretical concept to small-scale experiments to recent metropolitan-scale demonstrations. As the technology matures, it is expected to revolutionize quantum computing in much the same way that classical networks revolutionized classical computing. Quantum communications will also enable breakthroughs in quantum sensing, metrology, and other areas. However, scalability has emerged as a major challenge, particularly in terms of the number and heterogeneity of nodes, the distances between nodes, the diversity of applications, and the scale of user demand. This paper describes InterQnet, a multidisciplinary project that advances scalable quantum communications through a comprehensive approach that improves devices, error handling, and network architecture. InterQnet has a two-pronged strategy to address scalability challenges: InterQnet-Achieve focuses on practical realizations of heterogeneous quantum networks by building and then integrating first-generation quantum repeaters with error mitigation schemes and centralized automated network control systems. The resulting system will enable quantum communications between two heterogeneous quantum platforms through a third type of platform operating as a repeater node. InterQnet-Scale focuses on a systems study of architectural choices for scalable quantum networks by developing forward-looking models of quantum network devices, advanced error correction schemes, and entanglement protocols. Here we report our current progress toward achieving our scalability goals. 2025-09-23T19:22:45Z Joaquin Chung Daniel Dilley Ely Eastman Alvin Gonzales Kara Hokenstad Md Shariful Islam Varun Jorapur Joseph Petrullo Andy C. Y. Li Bikun Li Vasileios Niaouris Anirudh Ramesh Ansh Singal Caitao Zhan Michael Bishof Eric Chitambar Jacob P. Covey Alan Dibos Xu Han Liang Jiang Prem Kumar Jeffrey Larson Zain H. Saleem Rajkumar Kettimuthu http://arxiv.org/abs/2511.12854v2 Indirect Coflow Scheduling 2026-03-15T08:48:51Z We consider routing in reconfigurable networks, which is also known as coflow scheduling in the literature. The algorithmic literature generally (perhaps implicitly) assumes that the amount of data to be transferred is large. Thus the standard way to model a collection of requested data transfers is by an integer demand matrix $D$, where the entry in row $i$ and column $j$ of $D$ is an integer representing the amount of information that the application wants to send from machine/node $i$ to machine/node $j$. A feasible coflow schedule is then a sequence of matchings, which represent the sequence of data transfers that covers $D$. In this work, we investigate coflow scheduling when the size of some of the requested data transfers may be small relative to the amount of data that can be transferred in one round. fractional matchings and/or that employ indirect routing, and compare the relative utility of these options. We design algorithms that perform much better for small demands than the algorithms in the literature that were designed for large data transfers. 2025-11-17T00:49:49Z Alexander Lindermayr Kirk Pruhs Andréa W. Richa Tegan Wilson http://arxiv.org/abs/2603.02105v2 Resilient Chaotic Cross-Layer Routing for Smart Grid IoT Networks 2026-03-15T05:06:32Z This paper presents the Distributed Adaptive Multi-Radio Cross-Layer Routing (DAMCR) protocol, designed to enhance reliability, adaptability, and energy efficiency in smart grid and industrial Internet of Things (IoT) communication networks. DAMCR integrates Chaotic Frequency-Hopping Spread Spectrum (C-FHSS) to improve physical-layer security and jamming resilience with Link-Adaptive Quality Power Control (LAQPC) to dynamically regulate transmission power based on instantaneous link quality and residual node energy. To meet heterogeneous traffic requirements, the protocol incorporates priority-aware message classification that differentiates between periodic monitoring data and time-critical fault and protection messages. The proposed framework is implemented and evaluated in MATLAB using a heterogeneous network composed of LoRa, Wi-Fi, and dual-radio nodes operating under AWGN, Rayleigh, and Rician fading environments. Extensive simulation results demonstrate that DAMCR consistently achieves a Packet Delivery Ratio (PDR) exceeding 95% across all evaluated scenarios, while maintaining end-to-end latency between 17 and 23 ms, even in the presence of controlled jamming attacks. These results confirm that the tight integration of chaos-based spectrum agility, cross-technology routing, and energy-aware cross-layer adaptation significantly improves communication reliability, latency stability, and resilience compared to conventional single-radio and static-routing protocols. 2026-03-02T17:23:55Z Dhrumil Bhatt Anakha Kurup R. C. Mala http://arxiv.org/abs/2505.05067v3 Cross-Problem Solving for Network Optimization: Is Problem-Aware Learning the Key? 2026-03-15T02:31:01Z As intelligent network services continue to diversify, ensuring efficient and adaptive resource allocation in edge networks has become increasingly critical. Yet the wide functional variations across services often give rise to new and unforeseen optimization problems, rendering traditional manual modeling and solver design both time-consuming and inflexible. This limitation reveals a key gap between current methods and human solving - the inability to recognize and understand problem characteristics. It raises the question of whether problem-aware learning can bridge this gap and support effective cross-problem generalization. To answer this question, we propose a problem-aware diffusion (PAD) model, which leverages a problem-aware learning framework to enable cross-problem generalization. By explicitly encoding the mathematical formulations of optimization problems into token-level embeddings, PAD empowers the model to understand and adapt to problem structures. Extensive experiments across ten representative network optimization problems show that PAD generalizes well to unseen problems while avoiding the inefficiency of building new solvers from scratch, yet still delivering competitive solution quality. Meanwhile, an auxiliary constraint-aware module is designed to enforce solution validity further. The experiments indicate that problem-aware learning opens a promising direction toward general-purpose solvers for intelligent network operation and resource management. Our code is open source at https://github.com/qiyu3816/PAD. 2025-05-08T09:02:06Z IEEE JSAC Ruihuai Liang Bo Yang Pengyu Chen Xuelin Cao Zhiwen Yu H. Vincent Poor Chau Yuen http://arxiv.org/abs/2509.21550v2 A Target-Agnostic Protocol-Independent Interface for the Transport Layer 2026-03-14T22:13:13Z Transport protocols continue to evolve to meet the demands of new applications, workloads, and network environments, yet implementing and evolving transport protocols remains difficult and costly. High-performance transport stacks tightly interweave protocol behavior with system-level mechanisms such as packet I/O, memory management, and concurrency control, resulting in large code bases where protocol logic is scattered and hard to modify -- an issue exacerbated by modern heterogeneous execution environments. This paper introduces transport programs, a target-independent abstraction that precisely and centrally captures a transport protocol's reactions to relevant transport events using abstract instructions for key transport operations such as data reassembly, packet generation and scheduling, and timer manipulation, while leaving execution strategy and low-level mechanisms to the target. We show that transport programs can express a diverse set of transport protocols, be efficiently realized on targets built over DPDK and Linux XDP, achieve performance comparable to hand-optimized implementations, and enable protocol changes and portability across targets without modifying underlying infrastructure. 2025-09-25T20:34:52Z Pedro Mizuno Kimiya Mohammadtaheri Linfan Qian Joshua Johnson Danny Akbarzadeh Chris Neely Mario Baldi Nachiket Kapre Mina Tahmasbi Arashloo http://arxiv.org/abs/2603.14008v1 Measuring Weather Effects and Link Quality Dynamics in LEO Satellite Networks 2026-03-14T16:19:53Z This paper presents an empirical study of dynamic factors affecting link quality in Low Earth Orbit (LEO) satellite communications, using Starlink as a case study. Over 56 days, 112 high-quality meteorological measurements in mostly 1-min intervals, co-located with a user terminal, were collected, alongside frequent network performance data. Cloud characteristics were estimated using professional weather instruments such as a ceilometer, microwave radiometer, and vision-language model on sky images. Our results show that general cloud presence does not significantly impact throughput or latency. The impact of cloud coverage rather depends on the presence of liquid water in the atmosphere, quantified by liquid water path (LWP), which correlates with notable download throughput reductions (up to 60 MBit/s), especially during rain. Upload and latency were largely unaffected. Analysis of the evolving satellite network revealed that newer satellite hardware and infrastructural upgrades also contributed to performance increases during the experiment period. These findings highlight atmospheric liquid water as the key weather-related factor affecting link quality and underscore the influence of network changes over time. 2026-03-14T16:19:53Z satellite networks, non-terrestrial networks, LEOs, measurements, weather Clemens Lottermoser Simon Damm Stefan Schmid http://arxiv.org/abs/2511.09775v2 Privacy-Preserving Explainable AIoT Application via SHAP Entropy Regularization 2026-03-14T14:38:50Z The widespread integration of Artificial Intelligence of Things (AIoT) in smart home environments has amplified the demand for transparent and interpretable machine learning models. To foster user trust and comply with emerging regulatory frameworks, the Explainable AI (XAI) methods, particularly post-hoc techniques such as SHapley Additive exPlanations (SHAP), and Local Interpretable Model-Agnostic Explanations (LIME), are widely employed to elucidate model behavior. However, recent studies have shown that these explanation methods can inadvertently expose sensitive user attributes and behavioral patterns, thereby introducing new privacy risks. To address these concerns, we propose a novel privacy-preserving approach based on SHAP entropy regularization to mitigate privacy leakage in explainable AIoT applications. Our method incorporates an entropy-based regularization objective that penalizes low-entropy SHAP attribution distributions during training, promoting a more uniform spread of feature contributions. To evaluate the effectiveness of our approach, we developed a suite of SHAP-based privacy attacks that strategically leverage model explanation outputs to infer sensitive information. We validate our method through comparative evaluations using these attacks alongside utility metrics on benchmark smart home energy consumption datasets. Experimental results demonstrate that SHAP entropy regularization substantially reduces privacy leakage compared to baseline models, while maintaining high predictive accuracy and faithful explanation fidelity. This work contributes to the development of privacy-preserving explainable AI techniques for secure and trustworthy AIoT applications. 2025-11-12T22:13:32Z 2025 IEEE Annual Congress on Artificial Intelligence of Things (AIoT) Dilli Prasad Sharma Xiaowei Sun Liang Xue Xiaodong Lin Pulei Xiong 10.1109/AIoT66900.2025.00046 http://arxiv.org/abs/2603.13945v1 A Case for CATS: A Conductor-driven Asymmetric Transport Scheme for Semantic Prioritization 2026-03-14T13:36:15Z Standard transport protocols like TCP operate as a blind, FIFO conveyor belt for data, a model that is increasingly suboptimal for latency-sensitive and interactive applications. This paper challenges this model by introducing CATS (Conductor-driven Asymmetric Transport Scheme), a framework that provides TCP with the semantic awareness necessary to prioritize critical content. By centralizing scheduling intelligence in a transport-native "Conductor", CATS significantly improves user-perceived performance by delivering essential data first. This architecture directly confronts a cascade of historical performance workarounds and their limitations, including the high overhead of parallel connections in HTTP/1.1, the transport-layer Head-of-Line blocking in HTTP/2, and the observed implementation heterogeneity of prioritization in HTTP/3 over QUIC. Built upon TCP BBR, our ns-3 implementation demonstrates this principle by reducing the First Contentful Paint by over 78% in a representative webpage download configured as a deliberate worst-case scenario, with no penalty to total page load time compared to the baseline. 2026-03-14T13:36:15Z 2025 6th International Conference on Innovative Computing (ICIC) Syed Muhammad Aqdas Rizvi 10.1109/ICIC68258.2025.11413235 http://arxiv.org/abs/2510.17445v3 Adaptive Local Combining with Decentralized Decoding for Distributed Massive MIMO 2026-03-14T11:33:32Z Efficient uplink processing in distributed massive multiple-input multiple-output (D-mMIMO) systems requires both effective local combining and scalable decoding to significantly mitigate inter-user interference. Recent zero-forcing (ZF)-based combining schemes, such as partial full-pilot ZF (PFZF) and protected weak PFZF (PWPFZF), rely on heuristic threshold-based user grouping that may lead to inefficient utilization of spatial degrees of freedom across access points (APs). To address this limitation, we propose adaptive pilot-aware local combining strategies, generalized PFZF (G-PFZF) and generalized PWPFZF (G-PWPFZF), that dynamically allocate spatial degrees of freedom based on local channel conditions and replace heuristic grouping with a decentralized pilot-level optimization framework. Thus providing substantial performance gains over conventional PFZF and PWPFZF. Further, centralized decoding has recently emerged as a promising technique for interference suppression in D-mMIMO systems. However, it incurs substantial fronthaul overhead and computational costs. We develop a decentralized large-scale fading decoding (d-LSFD) scheme in which each AP computes LSFD weights using only locally available channel statistics. We derive a lower bound on the signal-to-interference-plus-noise ratio that explicitly quantifies the performance gap between the proposed d-LSFD scheme and centralized LSFD (c-LSFD), and identifies conditions under which the proposed decentralized solution approaches the centralized optimum. Numerical results demonstrate that the proposed generalized combining and the d-LSFD scheme together achieve significantly higher sum spectral efficiency in comparison to any combination of existing local combining and decoding schemes, while also substantially reducing the computational cost and fronthaul overhead. 2025-10-20T11:33:42Z Mohd Saif Ali Khan Karthik RM Samar Agnihotri