{"id":"https://openalex.org/W4415481036","doi":"https://doi.org/10.1145/3704413.3765320","title":"Poster: Triage Slicing: Online Detection and Containment of Disruptive UEs in O-RAN Slices","display_name":"Poster: Triage Slicing: Online Detection and Containment of Disruptive UEs in O-RAN Slices","publication_year":2025,"publication_date":"2025-10-23","ids":{"openalex":"https://openalex.org/W4415481036","doi":"https://doi.org/10.1145/3704413.3765320"},"language":null,"primary_location":{"id":"doi:10.1145/3704413.3765320","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3704413.3765320","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3704413.3765320","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Twenty-sixth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3704413.3765320","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102686427","display_name":"Xingqi Wu","orcid":"https://orcid.org/0009-0006-3044-6080"},"institutions":[{"id":"https://openalex.org/I4210130704","display_name":"University of Michigan\u2013Dearborn","ror":"https://ror.org/035wtm547","country_code":"US","type":"education","lineage":["https://openalex.org/I4210130704"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Xingqi Wu","raw_affiliation_strings":["University of Michigan - Dearborn, Dearborn, MI, USA"],"affiliations":[{"raw_affiliation_string":"University of Michigan - Dearborn, Dearborn, MI, USA","institution_ids":["https://openalex.org/I4210130704"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5117458855","display_name":"Ritesh Honnalli","orcid":null},"institutions":[{"id":"https://openalex.org/I4210130704","display_name":"University of Michigan\u2013Dearborn","ror":"https://ror.org/035wtm547","country_code":"US","type":"education","lineage":["https://openalex.org/I4210130704"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ritesh Honnalli","raw_affiliation_strings":["University of Michigan - Dearborn, Dearborn, USA"],"affiliations":[{"raw_affiliation_string":"University of Michigan - Dearborn, Dearborn, USA","institution_ids":["https://openalex.org/I4210130704"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082877482","display_name":"Junaid Farooq","orcid":"https://orcid.org/0000-0003-0618-9345"},"institutions":[{"id":"https://openalex.org/I4210130704","display_name":"University of Michigan\u2013Dearborn","ror":"https://ror.org/035wtm547","country_code":"US","type":"education","lineage":["https://openalex.org/I4210130704"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Junaid Farooq","raw_affiliation_strings":["University of Michigan - Dearborn, Dearbr, USA"],"affiliations":[{"raw_affiliation_string":"University of Michigan - Dearborn, Dearbr, USA","institution_ids":["https://openalex.org/I4210130704"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102686427"],"corresponding_institution_ids":["https://openalex.org/I4210130704"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.3788557,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"405","last_page":"406"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9794999957084656,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9794999957084656,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9546999931335449,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9520000219345093,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/triage","display_name":"Triage","score":0.7806000113487244},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4205999970436096},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.4129999876022339},{"id":"https://openalex.org/keywords/control-room","display_name":"Control room","score":0.40380001068115234},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.40139999985694885},{"id":"https://openalex.org/keywords/containment","display_name":"Containment (computer programming)","score":0.359499990940094}],"concepts":[{"id":"https://openalex.org/C2777120189","wikidata":"https://www.wikidata.org/wiki/Q780067","display_name":"Triage","level":2,"score":0.7806000113487244},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5619999766349792},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4205999970436096},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.4129999876022339},{"id":"https://openalex.org/C2779697362","wikidata":"https://www.wikidata.org/wiki/Q390516","display_name":"Control room","level":2,"score":0.40380001068115234},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.40139999985694885},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3871999979019165},{"id":"https://openalex.org/C2777019822","wikidata":"https://www.wikidata.org/wiki/Q390066","display_name":"Containment (computer programming)","level":2,"score":0.359499990940094},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.35850000381469727},{"id":"https://openalex.org/C61797465","wikidata":"https://www.wikidata.org/wiki/Q1188986","display_name":"Term (time)","level":2,"score":0.3544999957084656},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35040000081062317},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.2847999930381775},{"id":"https://openalex.org/C2777693866","wikidata":"https://www.wikidata.org/wiki/Q359099","display_name":"Blackout","level":4,"score":0.2662999927997589},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.2524999976158142}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3704413.3765320","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3704413.3765320","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3704413.3765320","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Twenty-sixth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3704413.3765320","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3704413.3765320","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3704413.3765320","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Twenty-sixth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4415481036.pdf"},"referenced_works_count":2,"referenced_works":["https://openalex.org/W4387415043","https://openalex.org/W4400228903"],"related_works":[],"abstract_inverted_index":{"User":[0],"equipments":[1],"(UEs)":[2],"sharing":[3],"a":[4,28,48],"RAN":[5],"slice":[6,22,50],"can":[7],"generate":[8],"bursty":[9],"or":[10],"unpredictable":[11],"traffic":[12],"that":[13,31],"degrades":[14],"the":[15,58],"quality":[16],"of":[17],"service":[18],"(QoS)":[19],"for":[20],"other":[21],"members.":[23],"We":[24],"present":[25],"triage":[26,64],"slicing,":[27],"control":[29,76],"mechanism":[30],"detects":[32],"disruptive":[33,68],"UEs":[34],"using":[35],"an":[36],"online":[37],"long":[38],"short":[39],"term":[40],"memory":[41],"(LSTM)":[42],"predictor":[43],"and":[44,73],"migrates":[45],"them":[46],"to":[47],"monitored":[49],"with":[51],"constrained,":[52],"risk":[53],"proportional":[54],"resources.":[55],"Implemented":[56],"on":[57],"Open":[59],"AI":[60],"Cellular":[61],"(OAIC)":[62],"testbed,":[63],"slicing":[65],"rapidly":[66],"contains":[67],"UEs,":[69],"preserves":[70],"benign":[71],"QoS,":[72],"incurs":[74],"minimal":[75],"overhead.":[77]},"counts_by_year":[],"updated_date":"2026-03-11T14:59:36.786465","created_date":"2025-10-23T00:00:00"}
