4.1 Article

A Bayesian Multi-Armed Bandit Algorithm for Dynamic End-to-End Routing in SDN-Based Networks with Piecewise-Stationary Rewards

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Chemistry, Analytical

Elastic Provisioning of Network and Computing Resources at the Edge for IoT Services

Patricia Cardoso et al.

Summary: This study proposes a solution that incorporates software-defined networking (SDN), network function virtualization (NFV), and fog computing (FC) to autonomously activate or deactivate embedded virtualized resources in response to clients' requests for edge services. Extensive tests show the superior performance of the proposed elastic edge resource provisioning algorithm, resulting in higher flow rate, smaller delay, and reduced loss compared to non-proactive controller operation. Furthermore, the controller records the duration of each edge service session, enabling resource accounting per session.

SENSORS (2023)

Article Computer Science, Information Systems

DRSIR: A Deep Reinforcement Learning Approach for Routing in Software-Defined Networking

Daniela M. Casas-Velasco et al.

Summary: Traditional routing protocols have limitations in terms of routing decision speed, adaptability to traffic changes, and support for quality of service requirements. To address these limitations, a deep reinforcement learning-based intelligent routing solution in software-defined networking (SDN) called DRSIR is proposed. DRSIR overcomes the limitations of reinforcement learning-based solutions and provides efficient and intelligent routing by considering path-state metrics.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2022)

Proceedings Paper Computer Science, Information Systems

Network Intrusion Detection for Smart Infrastructure using Multi-armed Bandit based Reinforcement Learning in Adversarial Environment

Zain Ul Abideen Tariq et al.

Summary: Network Intrusion Detection systems (NIDS) are crucial for ensuring the safety and security of communication and information networks. This paper discusses the limitations of signature-based IDS and proposes the use of anomaly-based IDS and Reinforcement Learning for intrusion detection. It also explores the application of Multi-Armed Bandit approaches for hyper-parameter optimization in unsupervised anomaly detection in smart homes, achieving significant improvements in accuracy and performance.

2022 INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS) (2022)

Article Computer Science, Information Systems

Multi-Armed Bandits With Correlated Arms

Samarth Gupta et al.

Summary: In this study, a unified approach was developed to leverage the correlations between rewards in a multi-armed bandit framework, resulting in fundamental generalizations of classic algorithms. Rigorous analysis showed that the proposed algorithms outperformed traditional methods, achieving order-optimal regret in correlated settings. Experimentation on real datasets further confirmed the significant improvement over classical bandit algorithms.

IEEE TRANSACTIONS ON INFORMATION THEORY (2021)

Article Computer Science, Information Systems

Joint Switch-Controller Association and Control Devolution for SDN Systems: An Integrated Online Perspective of Control and Learning

Xi Huang et al.

Summary: In this study, a solution is proposed to minimize costs and ensure queue stability in SDN systems through integrated learning and control design. Combining multi-armed bandit problem and optimal control techniques, the research achieves a balance between exploration and exploitation as well as long-term stability constraints.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2021)

Article Computer Science, Information Systems

A Survey on Machine Learning Techniques for Routing Optimization in SDN

Rashid Amin et al.

Summary: The introduction of Software-Defined Networking (SDN) separated the control plane and data plane in traditional networks, providing additional features and tools to address issues such as routing optimization. Researchers are leveraging machine learning (ML) techniques to enhance SDN routing applications, with a focus on supervised learning, unsupervised learning, and reinforcement learning.

IEEE ACCESS (2021)

Article Computer Science, Theory & Methods

Self-Configurable Cyber-Physical Intrusion Detection for Smart Homes Using Reinforcement Learning

Ryan Heartfield et al.

Summary: The modern Internet of Things (IoT)-based smart home presents a challenging security environment due to changing devices, new vulnerabilities, and different user interactions. MAGPIE is the first smart home intrusion detection system that autonomously adjusts its decision function based on changing conditions. It considers both cyber and physical data sources, detects human presence, and achieves high accuracy in intrusion detection.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Information Systems

Survey on Machine Learning for Intelligent End-to-End Communication Toward 6G: From Network Access, Routing to Traffic Control and Streaming Adaption

Fengxiao Tang et al.

Summary: End-to-end quality of service (QoS) and quality of experience (QoE) guarantee is crucial for network optimization, especially in 5G and future 6G networks. Machine learning algorithms are seen as key solutions for optimizing 6G networks, but there are still many challenges and open issues to be addressed.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2021)

Article Multidisciplinary Sciences

Modeling cooperative behavior for resilience in cyber-physical systems using SDN and NFV

Jose Moura et al.

SN APPLIED SCIENCES (2020)

Article Computer Science, Information Systems

Machine Learning for Resource Management in Cellular and IoT Networks: Potentials, Current Solutions, and Open Challenges

Fatima Hussain et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Computer Science, Information Systems

Artificial Neural Networks-Based Machine Learning for Wireless Networks: A Tutorial

Mingzhe Chen et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Hardware & Architecture

Multi-Armed Bandit in Action: Optimizing Performance in Dynamic Hybrid Networks

Sebastien Henri et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2018)

Article Computer Science, Information Systems

A comprehensive survey on machine learning for networking: evolution, applications and research opportunities

Raouf Boutaba et al.

JOURNAL OF INTERNET SERVICES AND APPLICATIONS (2018)

Article Computer Science, Theory & Methods

The nonstochastic multiarmed bandit problem

P Auer et al.

SIAM JOURNAL ON COMPUTING (2003)

Article Computer Science, Artificial Intelligence

Finite-time analysis of the multiarmed bandit problem

P Auer et al.

MACHINE LEARNING (2002)