Skip to content
Home » Blogposts

Blogposts

S-VOTE: Similarity-based Voting for Client Selection in Decentralized Federated Learning

This paper introduces S-VOTE, a similarity-based voting mechanism designed to improve both efficiency and model performance in Decentralized Federated Learning (DFL). Unlike traditional federated learning, DFL operates without a central server, relying on peer-to-peer communication. While this avoids bottlenecks and… Read More »S-VOTE: Similarity-based Voting for Client Selection in Decentralized Federated Learning

HyperDtct: Hypervisor-Based Ransomware Detection using System Calls

This paper presents HyperDtct, a hypervisor-based framework for detecting ransomware by monitoring system call behavior from outside the guest operating system. Rather than relying on in-guest agents or signature-based methods, both of which can be evaded by modern ransomware, HyperDtct… Read More »HyperDtct: Hypervisor-Based Ransomware Detection using System Calls

ProFe: Communication-Efficient Decentralized Federated Learning via Distillation and Prototypes

This paper introduces ProFe, a new algorithm designed to make Decentralized Federated Learning (DFL) more communication-efficient without compromising model performance. In DFL, clients collaborate without a central server, which avoids single-point failures but creates significant communication overhead—especially when nodes have… Read More »ProFe: Communication-Efficient Decentralized Federated Learning via Distillation and Prototypes

A Framework for Global Trust and Reputation Management in 6G Networks

This paper examines how future 6G networks—expected to function as large-scale cyber-physical systems—will require more advanced trust and reputation management mechanisms than those used today. As autonomous vehicles, drones, robots, and other intelligent agents collaborate in real time, the accuracy… Read More »A Framework for Global Trust and Reputation Management in 6G Networks

Analysis of Challenge-Response Authentication With Reconfigurable Intelligent Surfaces

This paper examines how Reconfigurable Intelligent Surfaces (RIS) can be used to strengthen wireless challenge–response physical-layer authentication (CR-PLA). In CR-PLA, the receiver verifies a transmitter by sending a challenge and checking whether the resulting channel response matches the expected physical… Read More »Analysis of Challenge-Response Authentication With Reconfigurable Intelligent Surfaces

One-Class Classification as GLRT for Jamming Detection in Private 5G Networks

This paper explores a machine-learning approach for detecting jamming attacks in private 5G networks by framing the problem as one-class classification. Rather than relying on prior knowledge of attacker behavior, the authors aim to detect whether a received signal deviates… Read More »One-Class Classification as GLRT for Jamming Detection in Private 5G Networks

A Novel Method to Mitigate Adversarial Attacks Against AI-as-a-Service Functionality

This paper proposes a lightweight defense mechanism to protect AI models exposed through AI-as-a-Service (AIaaS) from black-box adversarial attacks. As future networks rely more on remotely accessed AI functions, models become vulnerable to malicious queries that subtly manipulate inputs and… Read More »A Novel Method to Mitigate Adversarial Attacks Against AI-as-a-Service Functionality

SHERPA: Explainable Robust Algorithms for Privacy-Preserved Federated Learning in Future Networks to Defend Against Data Poisoning Attacks

This paper presents SHERPA, an explainability-driven defense framework designed to protect Federated Learning (FL) systems from data poisoning attacks. FL allows distributed devices to collaboratively train a global model without sharing raw data, but this also opens the door for… Read More »SHERPA: Explainable Robust Algorithms for Privacy-Preserved Federated Learning in Future Networks to Defend Against Data Poisoning Attacks

Advancing Security for 6G Smart Networks and Services

This paper provides a concise overview of how security must evolve as we move toward 6G smart networks, where communication, sensing, and computing become tightly integrated. It highlights that future systems will rely heavily on distributed AI/ML, making the protection… Read More »Advancing Security for 6G Smart Networks and Services