-
Private Network Performance and Power Consumption - User Space UPF Implementation
This dataset captures the energy and performance profiles of an user-space User Plane Function (UPF) OpenAirInterface implementation, within a 5G Core network. The primary... -
Private Radio Link Performance Evaluation - LoS scenario with Amarisoft base station
This dataset captures, using Nemo Outdoor software, data related to the radio link performance in two different infrastructures: a 5G Amarisoft base station and antennas... -
Private Radio Link Performance Evaluation - NLoS scenario with Mobile Network Operato...
This dataset captures, using Nemo Outdoor software, data related to the radio link performance in an infrastructure with antennas provided by a mobile network operator... -
Private Radio Link Performance Evaluation - NLoS scenario with Amarisoft base station
This dataset captures, using Nemo Outdoor software, data related to the radio link performance in two different infrastructures: a 5G Amarisoft base station and antennas... -
Private Radio Link Performance Evaluation - LoS scenario with Mobile Network Operator...
This dataset captures, using Nemo Outdoor software, data related to the radio link performance in an infrastructure with antennas provided by a mobile network operator... -
OpenAirInterface 5G Dataset: UDP Uplink Traffic Experiment with Three UEs
The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments... -
OpenAirInterface 5G Dataset: UDP Mixed Traffic (2 UL, 1 DL) Experiment with T...
The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments... -
OpenAirInterface 5G Dataset: UDP Mixed Traffic (1 UL, 2 DL) Experiment with T...
The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments... -
OpenAirInterface 5G Dataset: UDP Downlink Traffic Experiment with Three UEs
The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments... -
OpenAirInterface 5G Dataset: TCP Downlink Traffic Experiment with Two UEs
The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments... -
OpenAirInterface 5G Dataset: TCP Mixed Traffic Experiment with Two UEs
The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments... -
OpenAirInterface 5G Dataset: UDP Downlink Traffic Experiment with Two UEs
The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments... -
OpenAirInterface 5G Dataset: UDP Mixed Traffic Experiment with Two UEs
The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments... -
OpenAirInterface 5G Dataset: UDP Uplink Traffic Experiment with Two UEs
The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments... -
OpenAirInterface 5G Dataset: TCP Uplink Traffic Experiment with Two UEs
The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments... -
Conformity a Path-Aware Homophily measure for Node-Attributed Networks
Unveil the homophilic/heterophilic behaviors that characterize the wiring patterns of complex networks is an important task in social network analysis, often approached...-
PDF
The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
-
PDF
-
Fair detection of poisoning attacks in federated learning
Federated learning is a decentralized machine learning technique that aggregates partial models trained by a set of clients on their own private data to obtain a global model....-
PDF
The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
-
PDF
-
Efficient detection of Byzantine attacks in federated learning using last lay...
Federated learning (FL) is an alternative to centralized machine learning (ML) that builds a model across multiple decentralized edge devices (a.k.a. workers) that own the...-
PDF
The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
-
PDF
-
Information Technology Privacy and the Protection of Personal Data
Information technology allows us to generate, store, and process huge quantities of data. Search engines, satellites, sensor networks, scientists, security agencies,... -
Explaining misclassification and attacks in deep learning via random forests
Artificial intelligence, and machine learning (ML) in particular, is being used for different purposes that are critical for human life. To avoid an algorithm-based...-
PDF
The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
-
PDF