Skip to main content

Showing 1–50 of 78 results for author: Crowcroft, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2512.18596  [pdf, ps, other

    cs.LG

    EIA-SEC: Improved Actor-Critic Framework for Multi-UAV Collaborative Control in Smart Agriculture

    Authors: Quanxi Zhou, Wencan Mao, Yilei Liang, Manabu Tsukada, Yunling Liu, Jon Crowcroft

    Abstract: The widespread application of wireless communication technology has promoted the development of smart agriculture, where unmanned aerial vehicles (UAVs) play a multifunctional role. We target a multi-UAV smart agriculture system where UAVs cooperatively perform data collection, image acquisition, and communication tasks. In this context, we model a Markov decision process to solve the multi-UAV tr… ▽ More

    Submitted 21 December, 2025; originally announced December 2025.

  2. arXiv:2512.11892  [pdf, ps, other

    cs.CY cs.AI cs.NI

    Should AI Become an Intergenerational Civil Right?

    Authors: Jon Crowcroft, Rute C. Sofia, Dirk Trossen, Vassilis Tsaoussidis

    Abstract: Artificial Intelligence (AI) is rapidly becoming a foundational layer of social, economic, and cognitive infrastructure. At the same time, the training and large-scale deployment of AI systems rely on finite and unevenly distributed energy, networking, and computational resources. This tension exposes a largely unexamined problem in current AI governance: while expanding access to AI is essential… ▽ More

    Submitted 9 December, 2025; originally announced December 2025.

  3. arXiv:2510.19352  [pdf, ps, other

    cs.LG cs.CR cs.RO

    ConvXformer: Differentially Private Hybrid ConvNeXt-Transformer for Inertial Navigation

    Authors: Omer Tariq, Muhammad Bilal, Muneeb Ul Hassan, Dongsoo Han, Jon Crowcroft

    Abstract: Data-driven inertial sequence learning has revolutionized navigation in GPS-denied environments, offering superior odometric resolution compared to traditional Bayesian methods. However, deep learning-based inertial tracking systems remain vulnerable to privacy breaches that can expose sensitive training data. \hl{Existing differential privacy solutions often compromise model performance by introd… ▽ More

    Submitted 22 October, 2025; originally announced October 2025.

    Comments: 14 pages, 8 figures, 3 tables

    MSC Class: 68T07; 68T05; 68P27; 62M10 ACM Class: I.2.6; I.5.1; I.2.9; K.4.1; K.6.5; C.3; G.3

  4. arXiv:2509.17962  [pdf, ps, other

    cs.CR

    What if we could hot swap our Biometrics?

    Authors: Jon Crowcroft, Anil Madhavapeddy, Chris Hicks, Richard Mortier, Vasilios Mavroudis

    Abstract: What if you could really revoke your actual biometric identity, and install a new one, by live rewriting your biological self? We propose some novel mechanisms for hot swapping identity based in novel biotechnology. We discuss the potential positive use cases, and negative consequences if such technology was to become available and affordable. Biometrics are selected on the basis that they are sup… ▽ More

    Submitted 22 September, 2025; originally announced September 2025.

    ACM Class: J.3

  5. Steps towards an Ecology for the Internet

    Authors: Anil Madhavapeddy, Sam Reynolds, Alec P. Christie, David A. Coomes, Michael W. Dales, Patrick Ferris, Ryan Gibb, Hamed Haddadi, Sadiq Jaffer, Josh Millar, Cyrus Omar, William J. Sutherland, Jon Crowcroft

    Abstract: The Internet has grown from a humble set of protocols for end-to-end connectivity into a critical global system with no builtin "immune system". In the next decade the Internet will likely grow to a trillion nodes and need protection from threats ranging from floods of fake generative data to AI-driven malware. Unfortunately, growing centralisation has lead to the breakdown of mutualism across the… ▽ More

    Submitted 6 June, 2025; originally announced June 2025.

    Comments: To appear in the sixth decennial Aarhus conference: Computing X Crisis, Aug 2025

  6. arXiv:2503.08725  [pdf

    cs.CY cs.AI cs.ET cs.MA eess.SY

    The Algorithmic State Architecture (ASA): An Integrated Framework for AI-Enabled Government

    Authors: Zeynep Engin, Jon Crowcroft, David Hand, Philip Treleaven

    Abstract: As artificial intelligence transforms public sector operations, governments struggle to integrate technological innovations into coherent systems for effective service delivery. This paper introduces the Algorithmic State Architecture (ASA), a novel four-layer framework conceptualising how Digital Public Infrastructure, Data-for-Policy, Algorithmic Government/Governance, and GovTech interact as an… ▽ More

    Submitted 8 July, 2025; v1 submitted 10 March, 2025; originally announced March 2025.

    Comments: Main text: 25 pages, with references: 35 pages, 2 figures

  7. arXiv:2502.12069  [pdf, other

    cs.DC

    Distributed Consensus Network: A Modularized Communication Framework and Reliability Probabilistic Analysis

    Authors: Yuetai Li, Zhangchen Xu, Yiqi Wang, Zihan Zhou, Lei Zhang, Jon Crowcroft

    Abstract: In this paper, we propose a modularized framework for communication processes applicable to crash and Byzantine fault-tolerant consensus protocols. We abstract basic communication components and show that the communication process of the classic consensus protocols such as RAFT, single-decree Paxos, PBFT, and Hotstuff, can be represented by the combination of communication components. Based on the… ▽ More

    Submitted 17 February, 2025; originally announced February 2025.

  8. arXiv:2410.01644  [pdf, ps, other

    cs.DC cs.LG eess.SP

    A Novel Framework of Horizontal-Vertical Hybrid Federated Learning for EdgeIoT

    Authors: Kai Li, Yilei Liang, Xin Yuan, Wei Ni, Jon Crowcroft, Chau Yuen, Ozgur B. Akan

    Abstract: This letter puts forth a new hybrid horizontal-vertical federated learning (HoVeFL) for mobile edge computing-enabled Internet of Things (EdgeIoT). In this framework, certain EdgeIoT devices train local models using the same data samples but analyze disparate data features, while the others focus on the same features using non-independent and identically distributed (non-IID) data samples. Thus, e… ▽ More

    Submitted 2 October, 2024; originally announced October 2024.

    Comments: 5 pages, 3 figures

  9. arXiv:2406.02605  [pdf, other

    cs.CR cs.AI cs.CV cs.LG

    A Novel Defense Against Poisoning Attacks on Federated Learning: LayerCAM Augmented with Autoencoder

    Authors: Jingjing Zheng, Xin Yuan, Kai Li, Wei Ni, Eduardo Tovar, Jon Crowcroft

    Abstract: Recent attacks on federated learning (FL) can introduce malicious model updates that circumvent widely adopted Euclidean distance-based detection methods. This paper proposes a novel defense strategy, referred to as LayerCAM-AE, designed to counteract model poisoning in federated learning. The LayerCAM-AE puts forth a new Layer Class Activation Mapping (LayerCAM) integrated with an autoencoder (AE… ▽ More

    Submitted 2 June, 2024; originally announced June 2024.

  10. arXiv:2311.01956  [pdf, other

    cs.CR cs.AI

    Architecture of Smart Certificates for Web3 Applications Against Cyberthreats in Financial Industry

    Authors: Stefan Kambiz Behfar, Jon Crowcroft

    Abstract: This study addresses the security challenges associated with the current internet transformations, specifically focusing on emerging technologies such as blockchain and decentralized storage. It also investigates the role of Web3 applications in shaping the future of the internet. The primary objective is to propose a novel design for 'smart certificates,' which are digital certificates that can b… ▽ More

    Submitted 3 November, 2023; originally announced November 2023.

  11. arXiv:2311.01406  [pdf

    cs.LG cs.AI

    Analysis of Information Propagation in Ethereum Network Using Combined Graph Attention Network and Reinforcement Learning to Optimize Network Efficiency and Scalability

    Authors: Stefan Kambiz Behfar, Jon Crowcroft

    Abstract: Blockchain technology has revolutionized the way information is propagated in decentralized networks. Ethereum plays a pivotal role in facilitating smart contracts and decentralized applications. Understanding information propagation dynamics in Ethereum is crucial for ensuring network efficiency, security, and scalability. In this study, we propose an innovative approach that utilizes Graph Convo… ▽ More

    Submitted 2 November, 2023; originally announced November 2023.

  12. arXiv:2310.17297  [pdf, other

    cs.CR cs.CY

    Redactable and Sanitizable Signature Schemes: Applications and Limitations for use in Decentralized Digital Identity Systems

    Authors: Bryan Kumara, Mark Hooper, Carsten Maple, Timothy Hobson, Jon Crowcroft

    Abstract: Redactable signature schemes and sanitizable signature schemes are methods that permit modification of a given digital message and retain a valid signature. This can be applied to decentralized identity systems for delegating identity issuance and redacting sensitive information for privacy-preserving verification of identity. We propose implementing these protocols on a digital credential and com… ▽ More

    Submitted 26 October, 2023; originally announced October 2023.

    Comments: Extended Abstract, 3 Pages, 1 Figure, International Conference on AI and the Digital Economy 2023

  13. arXiv:2310.17260  [pdf, other

    cs.CY

    Socially Beneficial Metaverse: Framework, Technologies, Applications, and Challenges

    Authors: Xiaolong Xu, Xuanhong Zhou, Muhammad Bilal, Sherali Zeadally, Jon Crowcroft, Lianyong Qi, Shengjun Xue

    Abstract: In recent years, the maturation of emerging technologies such as Virtual Reality, Digital twins, and Blockchain has accelerated the realization of the metaverse. As a virtual world independent of the real world, the metaverse will provide users with a variety of virtual activities that bring great convenience to society. In addition, the metaverse can facilitate digital twins, which offers transfo… ▽ More

    Submitted 22 March, 2025; v1 submitted 26 October, 2023; originally announced October 2023.

    Comments: 28 pages, 6 figures, 3 tables

    MSC Class: 68U01; 68M11; 68U35 ACM Class: A.1; K.4

    Journal ref: Computer Networks, 2025

  14. arXiv:2310.15934  [pdf, other

    cs.CR

    Redactable Signature Schemes and Zero-knowledge Proofs: A comparative examination for applications in Decentralized Digital Identity Systems

    Authors: Bryan Kumara, Mark Hooper, Carsten Maple, Timothy Hobson, Jon Crowcroft

    Abstract: Redactable Signature Schemes and Zero-Knowledge Proofs are two radically different approaches to enable privacy. This paper analyses their merits and drawbacks when applied to decentralized identity system. Redactable Signatures, though competitively quick and compact, are not as expressive as zero-knowledge proofs and do not provide the same level of privacy. On the other hand, zero-knowledge pro… ▽ More

    Submitted 24 October, 2023; originally announced October 2023.

    Comments: 9 Pages, Trustworthy digital identity international conference 2023

  15. arXiv:2310.15813  [pdf, ps, other

    cs.CR

    Exploring the Risks and Challenges of National Electronic Identity (NeID) System

    Authors: Jide Edu, Mark Hooper, Carsten Maple, Jon Crowcroft

    Abstract: Many countries have embraced national electronic identification (NeID) systems, recognising their potential to foster a fair, transparent, and well-governed society by ensuring the secure verification of citizens' identities. The inclusive nature of NeID empowers people to exercise their rights while holding them accountable for fulfilling their obligations. Nevertheless, the development and imple… ▽ More

    Submitted 24 October, 2023; originally announced October 2023.

    Comments: 6 pages

  16. arXiv:2310.15784  [pdf, other

    cs.CR

    An Impact and Risk Assessment Framework for National Electronic Identity (eID) Systems

    Authors: Jide Edu, Mark Hooper, Carsten Maple, Jon Crowcroft

    Abstract: Electronic identification (eID) systems allow citizens to assert and authenticate their identities for various purposes, such as accessing government services or conducting financial transactions. These systems improve user access to rights, services, and the formal economy. As eID systems become an essential facet of national development, any failure, compromise, or misuse can be costly and damag… ▽ More

    Submitted 24 October, 2023; originally announced October 2023.

    Comments: 10 pages

  17. arXiv:2310.00144  [pdf, other

    cs.LG cs.AI cs.CR

    Probabilistic Sampling-Enhanced Temporal-Spatial GCN: A Scalable Framework for Transaction Anomaly Detection in Ethereum Networks

    Authors: Stefan Kambiz Behfar, Jon Crowcroft

    Abstract: The rapid evolution of the Ethereum network necessitates sophisticated techniques to ensure its robustness against potential threats and to maintain transparency. While Graph Neural Networks (GNNs) have pioneered anomaly detection in such platforms, capturing the intricacies of both spatial and temporal transactional patterns has remained a challenge. This study presents a fusion of Graph Convolut… ▽ More

    Submitted 29 September, 2023; originally announced October 2023.

  18. Towards Smart Education through the Internet of Things: A Review

    Authors: Afzal Badshah, Anwar Ghani, Ali Daud, Ateeqa Jalal, Muhammad Bilal, Jon Crowcroft

    Abstract: IoT is a fundamental enabling technology for creating smart spaces, which can assist the effective face-to-face and online education systems. The transition to smart education (integrating IoT and AI into the education system) is appealing, which has a concrete impact on learners' engagement, motivation, attendance, and deep learning. Traditional education faces many challenges, including administ… ▽ More

    Submitted 25 April, 2023; originally announced April 2023.

    Comments: 30 pages, 16 tables, 6 figures. This article is accepted for publication in ACM Computing Surveys

    ACM Class: K.3; A.1; J.4

  19. arXiv:2302.02508  [pdf, other

    cs.NI

    Jointly Optimal Routing and Caching with Bounded Link Capacities

    Authors: Yuanyuan Li, Yuchao Zhang, Stratis Ioannidis, Jon Crowcroft

    Abstract: We study a cache network in which intermediate nodes equipped with caches can serve requests. We model the problem of jointly optimizing caching and routing decisions with link capacity constraints over an arbitrary network topology. This problem can be formulated as a continuous diminishing-returns (DR) submodular maximization problem under multiple continuous DR-supermodular constraints, and is… ▽ More

    Submitted 5 February, 2023; originally announced February 2023.

    Comments: Extended version of 'Jointly Optimal Routing and Caching with Bounded Link Capacities' accepted by ICC 2023

  20. arXiv:2211.09029  [pdf, other

    cs.NI

    If Multicast is the Answer -- What was the Question?

    Authors: Dirk Trossen, Jon Crowcroft

    Abstract: Multicast is (almost) as old as the Internet, having become a tool for increasing network efficiency but also enabling destination discovery in a number of key use cases, although misaligned economic interests have limited its deployment to domain-local usages. But recent advances in multicast technologies as well as the identification of new use cases for which IP multicast may be ill fitted yet… ▽ More

    Submitted 16 November, 2022; originally announced November 2022.

    Comments: Under discussion

  21. arXiv:2210.05708  [pdf, other

    cs.DC

    Perspectives on Negative Research Results in Pervasive Computing

    Authors: Ella Peltonen, Nitinder Mohan, Peter Zdankin, Tanya Shreedhar, Tri Nguyen, Suzan Bayhan, Jon Crowcroft, Jussi Kangasharju, Daniela Nicklas

    Abstract: Not all research leads to fruitful results; trying new ways or methods may surpass the state of the art, but sometimes the hypothesis is not proven or the improvement is insignificant. In a systems discipline like pervasive computing, there are many sources of errors, from hardware issues over communication channels to heterogeneous software environments. However, failure to succeed is not a failu… ▽ More

    Submitted 11 October, 2022; originally announced October 2022.

  22. arXiv:2207.01750  [pdf, other

    cs.LG cs.AI cs.CR

    Federated Split GANs

    Authors: Pranvera Kortoçi, Yilei Liang, Pengyuan Zhou, Lik-Hang Lee, Abbas Mehrabi, Pan Hui, Sasu Tarkoma, Jon Crowcroft

    Abstract: Mobile devices and the immense amount and variety of data they generate are key enablers of machine learning (ML)-based applications. Traditional ML techniques have shifted toward new paradigms such as federated (FL) and split learning (SL) to improve the protection of user's data privacy. However, these paradigms often rely on server(s) located in the edge or cloud to train computationally-heavy… ▽ More

    Submitted 4 July, 2022; originally announced July 2022.

  23. Statistical QoS Analysis of Reconfigurable Intelligent Surface-assisted D2D Communication

    Authors: Syed Waqas Haider Shah, Adnan Noor Mian, Shahid Mumtaz, Anwer Al-Dulaimi, Chih-Lin I, Jon Crowcroft

    Abstract: This work performs the statistical QoS analysis of a Rician block-fading reconfigurable intelligent surface (RIS)-assisted D2D link in which the transmit node operates under delay QoS constraints. First, we perform mode selection for the D2D link, in which the D2D pair can either communicate directly by relaying data from RISs or through a base station (BS). Next, we provide closed-form expression… ▽ More

    Submitted 7 April, 2022; originally announced April 2022.

    Comments: Accepted for publication in IEEE Transactions on Vehicular Technology

  24. arXiv:2203.16122  [pdf, ps, other

    cs.HC

    Eff the ineffable: on the uncommunicability of a conceptually simple contribution to HCI methodology

    Authors: Helen Oliver, Richard Mortier, Jon Crowcroft

    Abstract: Given a simple concept that has the potential for a methodological contribution to the field of HCI, the constraints of submission conventions within the field may make it impossible to communicate the concept in a manner that is intelligible to the reader.

    Submitted 30 March, 2022; originally announced March 2022.

    Comments: 9 pages

  25. arXiv:2112.06498  [pdf, other

    cs.CR

    Proof of Steak

    Authors: Jon Crowcroft, Hamed Haddadi, Arthur Gervais, Tristan Henderson

    Abstract: We introduce Proof-of-Steak (PoS) as a fundamental net-zero block generation technique, often accompanied by Non-Frangipane Tokens. Genesis cut is gradually heated and minted (using the appropriate sauce), enabling the miners to redirect the extracted gold and the dissipated heat into the furnace, hence enabling the first fully-circular economy ever built using blockchain technology, utilising tam… ▽ More

    Submitted 13 December, 2021; originally announced December 2021.

    Comments: This is a silly article

  26. arXiv:2112.05566  [pdf, other

    cs.CR

    An Interface between Legacy and Modern Mobile Devices for Digital Identity

    Authors: Vasilios Mavroudis, Chris Hicks, Jon Crowcroft

    Abstract: In developing regions a substantial number of users rely on legacy and ultra-low-cost mobile devices. Unfortunately, many of these devices are not equipped to run the standard authentication or identity apps that are available for smartphones. Increasingly, apps that display Quick Response (QR) codes are being used to communicate personal credentials (e.g., Covid-19 vaccination certificates). This… ▽ More

    Submitted 10 December, 2021; originally announced December 2021.

  27. arXiv:2107.12217  [pdf, other

    cs.IT eess.SP

    Effective Capacity Analysis of HARQ-enabled D2D Communication in Multi-Tier Cellular Networks

    Authors: Syed Waqas Haider Shah, Muhammad Mahboob-ur-Rahman, Adnan Noor Mian, Octavia A. Dobre, Jon Crowcroft

    Abstract: This work does the statistical quality-of-service (QoS) analysis of a block-fading device-to-device (D2D) link in a multi-tier cellular network that consists of a macro-BS (BSMC) and a micro-BS (BSmC) which both operate in full-duplex (FD) mode. For the D2D link under consideration, we first formulate the mode selection problem-whereby D2D pair could either communicate directly, or, through the BS… ▽ More

    Submitted 26 July, 2021; originally announced July 2021.

    Comments: Accepted for publication in IEEE Transactions on Vehicular Technology

  28. arXiv:2105.01792  [pdf, other

    cs.PF eess.SY q-fin.RM

    Aggregate Cyber-Risk Management in the IoT Age: Cautionary Statistics for (Re)Insurers and Likes

    Authors: Ranjan Pal, Ziyuan Huang, Xinlong Yin, Sergey Lototsky, Swades De, Sasu Tarkoma, Mingyan Liu, Jon Crowcroft, Nishanth Sastry

    Abstract: In this paper, we provide (i) a rigorous general theory to elicit conditions on (tail-dependent) heavy-tailed cyber-risk distributions under which a risk management firm might find it (non)sustainable to provide aggregate cyber-risk coverage services for smart societies, and (ii)a real-data driven numerical study to validate claims made in theory assuming boundedly rational cyber-risk managers, al… ▽ More

    Submitted 4 May, 2021; originally announced May 2021.

    Comments: incrementally updated version to version in IEEE Internet of Things Journal

  29. Energy-Efficient MAC for Cellular IoT: State-of-the-Art, Challenges, and Standardization

    Authors: Syed Waqas Haider Shah, Adnan Noor Mian, Adnan Aijaz, Junaid Qadir, Jon Crowcroft

    Abstract: In the modern world, the connectivity-as-we-go model is gaining popularity. Internet-of-Things (IoT) envisions a future in which human beings communicate with each other and with devices that have identities and virtual personalities, as well as sensing, processing, and networking capabilities, which will allow the developing of smart environments that operate with little or no human intervention.… ▽ More

    Submitted 9 March, 2021; originally announced March 2021.

    Journal ref: IEEE Transactions on Green Communications and Networking, Feb. 2021

  30. arXiv:2103.02823  [pdf, other

    cs.NI

    Toward Native Artificial Intelligence in 6G Networks: System Design, Architectures, and Paradigms

    Authors: Jianjun Wu, Rongpeng Li, Xueli An, Chenghui Peng, Zhe Liu, Jon Crowcroft, Honggang Zhang

    Abstract: The mobile communication system has transformed to be the fundamental infrastructure to support digital demands from all industry sectors, and 6G is envisioned to go far beyond the communication-only purpose. There is coming to a consensus that 6G will treat Artificial Intelligence (AI) as the cornerstone and has a potential capability to provide "intelligence inclusion", which implies to enable t… ▽ More

    Submitted 3 March, 2021; originally announced March 2021.

  31. arXiv:2101.06301  [pdf

    cs.NI cs.CY

    Wi-Fi Wardriving Studies Must Account for Important Statistical Issues

    Authors: Edward J Oughton, Julius Kusuma, Thibault Peyronel, Jon Crowcroft

    Abstract: Knowledge of Wi-Fi networks helps to guide future engineering and spectrum policy decisions. However, due to its unlicensed nature, the deployment of Wi-Fi Access Points is undocumented meaning researchers are left making educated guesses as to the prevalence of these assets through remotely collected or passively sensed measurements. One commonly used method is referred to as `wardriving` essenti… ▽ More

    Submitted 19 January, 2021; v1 submitted 15 January, 2021; originally announced January 2021.

  32. arXiv:2012.08729  [pdf, ps, other

    cs.SI

    Data Trading with a Monopoly Social Network: Outcomes are Mostly Privacy Welfare Damaging

    Authors: Ranjan Pal, Junhui Li, Yixuan Wang, Mingyan Liu, Swades De, Jon Crowcroft

    Abstract: This paper argues that data of strategic individuals with heterogeneous privacy valuations in a distributed online social network (e.g., Facebook) will be under-priced, if traded in a monopoly buyer setting, and will lead to diminishing utilitarian welfare. This result, for a certain family of online community data trading problems, is in stark contrast to a popular information economics intuition… ▽ More

    Submitted 24 November, 2021; v1 submitted 15 December, 2020; originally announced December 2020.

    Comments: incrementally updated version to version in IEEE Networking Letters; This work is based upon results in NBER w26296

  33. arXiv:2010.12981  [pdf, other

    cs.NI cs.CR

    The Benefits of Deploying Smart Contracts on Trusted Third Parties

    Authors: Carlos Molina-Jimenez, Ioannis Sfyrakis, Linmao Song, Hazem Danny Al Nakib, Jon Crowcroft

    Abstract: The hype about Bitcoin has overrated the potential of smart contracts deployed on-blockchains (on-chains) and underrated the potential of smart contracts deployed on-Trusted Third Parties (on-TTPs). As a result, current research and development in this field is focused mainly on smart contract applications that use on-chain smart contracts. We argue that there is a large class of smart contract ap… ▽ More

    Submitted 24 October, 2020; originally announced October 2020.

    Comments: The document consists of 14 pages and includes four figures, one table and 76 references. It the work of five authors. Carlos Molina-Jimenez is the corresponding and responsible author

  34. arXiv:2010.07013  [pdf, other

    cs.CY cs.CR

    A Case for a Currencyless Economy Based on Bartering with Smart Contracts

    Authors: Carlos Molina-Jimenez, Hazem Danny Al Nakib, Linmao Song, Ioannis Sfyrakis, Jon Crowcroft

    Abstract: We suggest the re-introduction of bartering to create a cryptocurrencyless, currencyless, and moneyless economy segment. We contend that a barter economy would benefit enterprises, individuals, governments and societies. For instance, the availability of an online peer-to-peer barter marketplace would convert ordinary individuals into potential traders of both tangible and digital items and servic… ▽ More

    Submitted 8 October, 2020; originally announced October 2020.

    Comments: The document consists of 22 pages in total, including references and two figures. The author list has five authors

  35. Differentially Private Health Tokens for Estimating COVID-19 Risk

    Authors: David Butler, Chris Hicks, James Bell, Carsten Maple, Jon Crowcroft

    Abstract: In the fight against Covid-19, many governments and businesses are in the process of evaluating, trialling and even implementing so-called immunity passports. Also known as antibody or health certificates, there is a clear demand for any technology that could allow people to return to work and other crowded places without placing others at risk. One of the major criticisms of such systems is that… ▽ More

    Submitted 8 July, 2020; v1 submitted 25 June, 2020; originally announced June 2020.

  36. arXiv:2005.11833  [pdf, other

    cs.CR

    SecureABC: Secure AntiBody Certificates for COVID-19

    Authors: Chris Hicks, David Butler, Carsten Maple, Jon Crowcroft

    Abstract: COVID-19 has resulted in unprecedented social distancing policies being enforced worldwide. As governments seek to restore their economies, open workplaces and permit travel there is a demand for technologies that may alleviate the requirement for social distancing whilst also protecting healthcare services. In this work we explore the controversial technique of so-called immunity passports and pr… ▽ More

    Submitted 12 October, 2020; v1 submitted 24 May, 2020; originally announced May 2020.

  37. arXiv:2004.08003  [pdf, other

    cs.NI cs.DC

    SoK: Beyond IoT MUD Deployments -- Challenges and Future Directions

    Authors: Angelo Feraudo, Poonam Yadav, Richard Mortier, Paolo Bellavista, Jon Crowcroft

    Abstract: Due to the advancement of IoT devices in both domestic and industrial environments, the need to incorporate a mechanism to build accountability in the IoT ecosystem is paramount. In the last few years, various initiatives have been started in this direction addressing many socio-technical concerns and challenges to build an accountable system. The solution that has received a lot of attention in b… ▽ More

    Submitted 22 April, 2020; v1 submitted 16 April, 2020; originally announced April 2020.

    Comments: 7 pages, 5 figures, WIP

    ACM Class: C.2.1; C.2.3; C.2.6; C.2

  38. arXiv:2004.06935  [pdf, other

    cs.IT cs.NI

    Intelligent Slicing of Radio Resource Control Layer for Cellular IoT: Design and Implementation

    Authors: Lian Cao, Rongpeng Li, Jon Crowcroft, Zhifeng Zhao, Honggang Zhang

    Abstract: The cellular internet of things (CIoT) has become an important branch to cater various applications of IoT devices. Within CIoT, the radio resource control (RRC) layer is responsible for fundamental functionalities such as connection control and bearer establishment in radio access network (RAN). The emergence of various IoT scenarios and diversified service requirements have made both RAN slicing… ▽ More

    Submitted 15 April, 2020; originally announced April 2020.

    Comments: Submitted to IEEE Internet of Things Journal

  39. arXiv:2004.04059  [pdf, other

    cs.CR

    TraceSecure: Towards Privacy Preserving Contact Tracing

    Authors: James Bell, David Butler, Chris Hicks, Jon Crowcroft

    Abstract: Contact tracing is being widely employed to combat the spread of COVID-19. Many apps have been developed that allow for tracing to be done automatically based off location and interaction data generated by users. There are concerns, however, regarding the privacy and security of users data when using these apps. These concerns are paramount for users who contract the virus, as they are generally r… ▽ More

    Submitted 8 April, 2020; originally announced April 2020.

  40. arXiv:2003.12172  [pdf, other

    cs.NI cs.AI

    Edge Intelligence: Architectures, Challenges, and Applications

    Authors: Dianlei Xu, Tong Li, Yong Li, Xiang Su, Sasu Tarkoma, Tao Jiang, Jon Crowcroft, Pan Hui

    Abstract: Edge intelligence refers to a set of connected systems and devices for data collection, caching, processing, and analysis in locations close to where data is captured based on artificial intelligence. The aim of edge intelligence is to enhance the quality and speed of data processing and protect the privacy and security of the data. Although recently emerged, spanning the period from 2011 to now,… ▽ More

    Submitted 12 June, 2020; v1 submitted 26 March, 2020; originally announced March 2020.

    Comments: 53 pages, 37 figures, survey

  41. SCDP: Systematic Rateless Coding for Efficient Data Transport in Data Centres (Complete Version)

    Authors: Mohammed Alasmar, George Parisis, Jon Crowcroft

    Abstract: In this paper we propose SCDP, a general-purpose data transport protocol for data centres that, in contrast to all other protocols proposed to date, supports efficient one-to-many and many-to-one communication, which is extremely common in modern data centres. SCDP does so without compromising on efficiency for short and long unicast flows. SCDP achieves this by integrating RaptorQ codes with rece… ▽ More

    Submitted 2 August, 2021; v1 submitted 19 September, 2019; originally announced September 2019.

    Comments: 14 pages, 17 figures, Submitted to ToN Journal

    Journal ref: IEEE/ACM Transactions on Networking 2021

  42. arXiv:1907.08059  [pdf, other

    cs.LG cs.IT stat.ML

    Federated Principal Component Analysis

    Authors: Andreas Grammenos, Rodrigo Mendoza-Smith, Jon Crowcroft, Cecilia Mascolo

    Abstract: We present a federated, asynchronous, and $(\varepsilon, δ)$-differentially private algorithm for PCA in the memory-limited setting. Our algorithm incrementally computes local model updates using a streaming procedure and adaptively estimates its $r$ leading principal components when only $\mathcal{O}(dr)$ memory is available with $d$ being the dimensionality of the data. We guarantee differential… ▽ More

    Submitted 22 October, 2020; v1 submitted 18 July, 2019; originally announced July 2019.

    Comments: 36 pages, 13 figures, 1 table. Accepted for publication at Neural Information Processing Systems (NeurIPS 2020), Vancouver, Canada

  43. arXiv:1906.06240  [pdf, other

    cs.DC cs.PF

    Diffusing Your Mobile Apps: Extending In-Network Function Virtualization to Mobile Function Offloading

    Authors: Mario Almeida, Liang Wang, Jeremy Blackburn, Konstantina Papagiannaki, Jon Crowcroft

    Abstract: Motivated by the huge disparity between the limited battery capacity of user devices and the ever-growing energy demands of modern mobile apps, we propose INFv. It is the first offloading system able to cache, migrate and dynamically execute on demand functionality from mobile devices in ISP networks. It aims to bridge this gap by extending the promising NFV paradigm to mobile applications in orde… ▽ More

    Submitted 14 June, 2019; originally announced June 2019.

  44. arXiv:1904.00733  [pdf, other

    cs.CR

    Blockchain And The Future of the Internet: A Comprehensive Review

    Authors: Fakhar ul Hassan, Anwaar Ali, Mohamed Rahouti, Siddique Latif, Salil Kanhere, Jatinder Singh, AlaAl-Fuqaha, Umar Janjua, Adnan Noor Mian, Junaid Qadir, Jon Crowcroft

    Abstract: Blockchain is challenging the status quo of the central trust infrastructure currently prevalent in the Internet towards a design principle that is underscored by decentralization, transparency, and trusted auditability. In ideal terms, blockchain advocates a decentralized, transparent, and more democratic version of the Internet. Essentially being a trusted and decentralized database, blockchain… ▽ More

    Submitted 13 November, 2020; v1 submitted 23 February, 2019; originally announced April 2019.

    Comments: Under Review in IEEE COMST

  45. A Bibliometric Analysis of Publications in Computer Networking Research

    Authors: Waleed Iqbal, Junaid Qadir, Gareth Tyson, Adnan Noor Mian, Saeed Ul Hassan, Jon Crowcroft

    Abstract: This study uses the article content and metadata of four important computer networking periodicals-IEEE Communications Surveys and Tutorials (COMST), IEEE/ACM Transactions on Networking (TON), ACM Special Interest Group on Data Communications (SIGCOMM), and IEEE International Conference on Computer Communications (INFOCOM)-obtained using ACM, IEEE Xplore, Scopus and CrossRef, for an 18-year period… ▽ More

    Submitted 4 March, 2019; originally announced March 2019.

    Comments: 36 Pages, Currently submitted to Springer Scientometrics Journal 2019

    MSC Class: 62-07

    Journal ref: Scientometrics 2019

  46. arXiv:1811.04078  [pdf, other

    cs.NI cs.CR cs.DC

    Blockchain for Economically Sustainable Wireless Mesh Networks

    Authors: Aniruddh Rao Kabbinale, Emmanouil Dimogerontakis, Mennan Selimi, Anwaar Ali, Leandro Navarro, Arjuna Sathiaseelan, Jon Crowcroft

    Abstract: Decentralization, in the form of mesh networking and blockchain, two promising technologies, is coming to the telecommunications industry. Mesh networking allows wider low cost Internet access with infrastructures built from routers contributed by diverse owners, while blockchain enables transparency and accountability for investments, revenue or other forms of economic compensations from sharing… ▽ More

    Submitted 2 April, 2019; v1 submitted 11 November, 2018; originally announced November 2018.

    Comments: arXiv admin note: substantial text overlap with arXiv:1804.00561

    Report number: ARK54-1

  47. arXiv:1808.00093  [pdf, other

    cs.SE

    Implementation of Smart Contracts Using Hybrid Architectures with On- and Off-Blockchain Components

    Authors: Carlos Molina-Jimenez, Ioannis Sfyrakis, Ellis Solaiman, Irene Ng, Meng Weng Wong, Alexis Chun, Jon Crowcroft

    Abstract: Recently, decentralised (on-blockchain) platforms have emerged to complement centralised (off-blockchain) platforms for the implementation of automated, digital (smart) contracts. However, neither alternative can individually satisfy the requirements of a large class of applications. On-blockchain platforms suffer from scalability, performance, transaction costs and other limitations. Off-blockcha… ▽ More

    Submitted 31 July, 2018; originally announced August 2018.

    Comments: 12 pages, 7 figures

  48. arXiv:1806.02410  [pdf

    cs.NI

    On the Impact of Guest Traffic in Open-Access Domestic Broadband Sharing Schemes

    Authors: Sotiris Lenas, Vassilis Tsaoussidis, Srikanth Sundaresan, Arjuna Sathiaseelan, Jon Crowcroft

    Abstract: Open-access domestic broadband connection sharing constitutes a voluntary practice that is associated with societal, economic and public-safety benefits. Despite this fact, broadband subscribers are usually hesitant to freely share their broadband connection with guests for a multitude of reasons; one of them being sharing their network might hinder their own broadband quality of experience. In th… ▽ More

    Submitted 6 June, 2018; originally announced June 2018.

  49. arXiv:1805.05995  [pdf, other

    cs.SE cs.DB

    Data Analytics Service Composition and Deployment on Edge Devices

    Authors: Jianxin Zhao, Tudor Tiplea, Richard Mortier, Jon Crowcroft, Liang Wang

    Abstract: Data analytics on edge devices has gained rapid growth in research, industry, and different aspects of our daily life. This topic still faces many challenges such as limited computation resource on edge devices. In this paper, we further identify two main challenges: the composition and deployment of data analytics services on edge devices. We present the Zoo system to address these two challenge:… ▽ More

    Submitted 13 April, 2018; originally announced May 2018.

  50. arXiv:1805.00626  [pdf, other

    cs.CY cs.CR cs.DC

    On and Off-Blockchain Enforcement Of Smart Contracts

    Authors: Carlos Molina-Jimenez, Ellis Solaiman, Ioannis Sfyrakis, Irene Ng, Jon Crowcroft

    Abstract: In this paper we discuss how conventional business contracts can be converted into smart contracts---their electronic equivalents that can be used to systematically monitor and enforce contractual rights, obligations and prohibitions at run time. We explain that emerging blockchain technology is certainly a promising platform for implementing smart contracts but argue that there is a large class o… ▽ More

    Submitted 2 May, 2018; originally announced May 2018.