CovertComBench: A First Domain-Specific Testbed for LLMs in Wireless Covert Communication

This paper introduces CovertComBench, a specialized benchmark for evaluating Large Language Models in wireless covert communication, revealing that while current models excel at conceptual understanding and code generation, they significantly struggle with the rigorous mathematical derivations required for security-constrained optimization.

Zhaozhi Liu, Jiaxin Chen, Yuanai Xie, Yuna Jiang, Minrui Xu, Xiao Zhang, Pan Lai, Zan ZhouWed, 11 Ma💻 cs

Role Classification of Hosts within Enterprise Networks Based on Connection Patterns

This paper addresses the problem of role classification in enterprise networks by introducing two practical algorithms that group hosts based on evolving connection patterns to simplify network management and enhance monitoring accuracy, demonstrating their effectiveness through commercial implementation and significant reduction in host grouping complexity.

Godfrey Tan, Massimiliano Poletto, John Guttag, Frans KaashoekWed, 11 Ma💻 cs

PixelConfig: Longitudinal Measurement and Reverse-Engineering of Meta Pixel Configurations

This paper introduces PixelConfig, a framework for reverse-engineering Meta Pixel configurations, which reveals that default settings drive widespread adoption of activity and identity tracking features capable of capturing sensitive health data, while existing tracking restriction mechanisms offer limited practical protection.

Abdullah Ghani (Lahore University of Management Sciences), Yash Vekaria (University of California, Davis), Zubair Shafiq (University of California, Davis)Wed, 11 Ma💻 cs

On the Multi-Commodity Flow with convex objective function: Column-Generation approaches

This paper proposes a column-generation-based algorithmic framework to efficiently solve both splittable and unsplittable variants of the capacitated Multi-Commodity Flow problem with convex, potentially non-differentiable, link cost functions, offering a robust optimization approach for managing traffic in telecommunication networks.

Guillaume Beraud-Sudreau, Lucas Létocart, Youcef Magnouche, Sébastien MartinWed, 11 Ma💻 cs

ZeroSiam: An Efficient Asymmetry for Test-Time Entropy Optimization without Collapse

This paper introduces ZeroSiam, an efficient asymmetric Siamese architecture that prevents model collapse during test-time entropy minimization by employing asymmetric divergence alignment, thereby enhancing adaptation and reasoning performance across diverse vision and language tasks with negligible overhead.

Guohao Chen, Shuaicheng Niu, Deyu Chen, Jiahao Yang, Zitian Zhang, Mingkui Tan, Pengcheng Wu, Zhiqi ShenWed, 11 Ma🤖 cs.LG

Why Channel-Centric Models are not Enough to Predict End-to-End Performance in Private 5G: A Measurement Campaign and Case Study

This paper demonstrates that channel-centric models, including ray-tracing simulators, fail to accurately predict end-to-end throughput in private 5G networks due to systematic over-estimation of MIMO spatial layers, whereas data-driven Gaussian process models trained on direct measurements provide significantly more reliable predictions for communication-aware robot planning.

Nils JörgensenWed, 11 Ma🤖 cs.LG

PPO-Based Hybrid Optimization for RIS-Assisted Semantic Vehicular Edge Computing

This paper proposes a Reconfigurable Intelligent Surface (RIS)-aided semantic-aware Vehicle Edge Computing framework that utilizes a Proximal Policy Optimization (PPO) and Linear Programming (LP) hybrid scheme to jointly optimize offloading ratios, semantic symbols, and RIS phase shifts, achieving a 40–50% reduction in end-to-end latency compared to existing methods.

Wei Feng, Jingbo Zhang, Qiong Wu, Pingyi Fan, Qiang FanWed, 11 Ma🤖 cs.LG

Joint User Association and Resource Allocation for Adaptive Semantic Communication in 5G and Beyond Networks

This paper proposes a joint user association and resource allocation framework for Adaptive Semantic Communication in 5G and beyond networks, which dynamically adjusts DNN-based transceivers to address user heterogeneity and maximizes system utility under energy and latency constraints through a decomposed, polynomial-time algorithm.

Xingqiu He, Chaoqun You, Zihan Chen, Yao Sun, Dongzhu Liu, Tony Q. S. Quek, Yue GaoTue, 10 Ma💻 cs