The regulation of platforms has been a hot topic, particularly in Europe with the Digital Markets Act (DMA) passed in 2022. The purpose of this paper is to design a mathematical model representing a game between long-term revenue-oriented platforms in competition playing with their ranking strategy of items. The objective of platforms is to apply a...
Signal processing for wireless communications often use a third order Volterra series to model the nonlinear amplifier. Nevertheless, the Saleh model corresponds better to power amplifier device. We optimize the parameters of the Volterra series and derive their analytical expression using the moments of functions of exponential variables. We show ...
We introduce a learning-based approach to optimize a joint constellation for a multi-user MIMO broadcast channel ($T$ Tx antennas, $K$ users, each with $R$ Rx antennas), with perfect channel knowledge. The aim of the optimizer (MAX-MIN) is to maximize the minimum mutual information between the transmitter and each receiver, under a sum-power constr...
In recent years, machine learning-based anomaly detection (AD) has become an important measure against security threats from Internet of Things (IoT) networks. Machine learning (ML) models for network traffic AD require datasets to be trained, evaluated and compared. Due to the necessity of realistic and up-to-date representation of IoT security th...
da Silva Barros, TiagoFerre, DavideGiroire, FredericAparicio-Pardo, RamonPerennes, Stephane
Advancements in cloud computing have boosted Machine Learning as a Service (MLaaS), highlighting the challenge of scheduling tasks under latency and deadline constraints. Neural network compression offers the latency and energy consumption reduction in data centers, aligning with efforts to minimize cloud computing's carbon footprint, despite some ...
Cyber-Physical Systems (CPSs) complexity has been continuously increasing to support new life-impacting applications, such as Internet of Things (IoT) devices or Industrial Control Systems (ICSs). These characteristics introduce new critical security challenges to both industrial practitioners and academics. This work investigates how Model-Based S...
Grant-free random access (GFRA) is now a popular protocol for large-scale wireless multiple access systems in order to reduce control signaling. Resource allocation in GFRA can be viewed as a form of frame slotted ALOHA, where a ubiquitous design assumption is device homogeneity. In particular, the probability that a device seeks to transmit data i...