Search Results for author: M. Cenk Gursoy

Found 28 papers, 2 papers with code

Learning-Based UAV Path Planning for Data Collection with Integrated Collision Avoidance

no code implementations11 Dec 2023 Xueyuan Wang, M. Cenk Gursoy, Tugba Erpek, Yalin E. Sagduyu

Unmanned aerial vehicles (UAVs) are expected to be an integral part of wireless networks, and determining collision-free trajectory in multi-UAV non-cooperative scenarios while collecting data from distributed Internet of Things (IoT) nodes is a challenging task.

Collision Avoidance Decision Making

Robust and Decentralized Reinforcement Learning for UAV Path Planning in IoT Networks

no code implementations11 Dec 2023 Xueyuan Wang, M. Cenk Gursoy

We address three different practical scenarios, including single UAV path planning, UAV swarm path planning, and single UAV path planning in the presence of an intelligent mobile UAV jammer.

QMGeo: Differentially Private Federated Learning via Stochastic Quantization with Mixed Truncated Geometric Distribution

no code implementations10 Dec 2023 Zixi Wang, M. Cenk Gursoy

Several differential privacy (DP) mechanisms have been proposed to provide provable privacy guarantees by introducing randomness into the framework, and majority of these mechanisms rely on injecting additive noise.

Federated Learning Quantization

Anomaly Detection via Learning-Based Sequential Controlled Sensing

no code implementations30 Nov 2023 Geethu Joseph, Chen Zhong, M. Cenk Gursoy, Senem Velipasalar, Pramod K. Varshney

Our objective is to design a sequential selection policy that dynamically determines which processes to observe at each time with the goal to minimize the delay in making the decision and the total sensing cost.

Anomaly Detection Decision Making +1

Robust Network Slicing: Multi-Agent Policies, Adversarial Attacks, and Defensive Strategies

no code implementations19 Nov 2023 Feng Wang, M. Cenk Gursoy, Senem Velipasalar

We evaluate the performance of the proposed policy ensemble algorithm by applying on the network slicing agents and the jammer agent in simulations to show its effectiveness.

Maximum Knowledge Orthogonality Reconstruction with Gradients in Federated Learning

1 code implementation30 Oct 2023 Feng Wang, Senem Velipasalar, M. Cenk Gursoy

MKOR only requires the server to send secretly modified parameters to clients and can efficiently and inconspicuously reconstruct the input images from clients' gradient updates.

Federated Learning

Communication-Efficient and Privacy-Preserving Feature-based Federated Transfer Learning

1 code implementation12 Sep 2022 Feng Wang, M. Cenk Gursoy, Senem Velipasalar

In order to improve the communication efficiency, we in this paper propose the feature-based federated transfer learning as an innovative approach to reduce the uplink payload by more than five orders of magnitude compared to that of existing approaches.

Federated Learning Image Classification +2

Temporal Detection of Anomalies via Actor-Critic Based Controlled Sensing

no code implementations3 Jan 2022 Geethu Joseph, M. Cenk Gursoy, Pramod K. Varshney

Based on the received observations, the decisionmaker first determines whether to declare that the number of anomalies has exceeded the threshold or to continue taking observations.

Anomaly Detection Decision Making

Dynamic Channel Access via Meta-Reinforcement Learning

no code implementations24 Dec 2021 Ziyang Lu, M. Cenk Gursoy

In this paper, we address the channel access problem in a dynamic wireless environment via meta-reinforcement learning.

Meta-Learning Meta Reinforcement Learning +2

Scalable and Decentralized Algorithms for Anomaly Detection via Learning-Based Controlled Sensing

no code implementations8 Dec 2021 Geethu Joseph, Chen Zhong, M. Cenk Gursoy, Senem Velipasalar, Pramod K. Varshney

In this setting, we develop an anomaly detection algorithm that chooses the processes to be observed at a given time instant, decides when to stop taking observations, and declares the decision on anomalous processes.

Anomaly Detection Decision Making

LEARNING DISTRIBUTIONS GENERATED BY SINGLE-LAYER RELU NETWORKS IN THE PRESENCE OF ARBITRARY OUTLIERS

no code implementations29 Sep 2021 Saikiran Bulusu, Geethu Joseph, M. Cenk Gursoy, Pramod Varshney

Further, we prove that ${O}(\frac{1}{\epsilon p^4}\log\frac{d}{\delta})$ samples are sufficient for our algorithm to estimate the NN parameters within an error of $\epsilon$ with probability $1-\delta$ when the probability of a sample being uncorrupted is $p$ and the problem dimension is $d$.

Adversarial Reinforcement Learning in Dynamic Channel Access and Power Control

no code implementations12 May 2021 Feng Wang, M. Cenk Gursoy, Senem Velipasalar

Deep reinforcement learning (DRL) has recently been used to perform efficient resource allocation in wireless communications.

reinforcement-learning Reinforcement Learning (RL)

A Scalable Algorithm for Anomaly Detection via Learning-Based Controlled Sensing

no code implementations12 May 2021 Geethu Joseph, M. Cenk Gursoy, Pramod K. Varshney

In this setting, we develop an anomaly detection algorithm that chooses the process to be observed at a given time instant, decides when to stop taking observations, and makes a decision regarding the anomalous processes.

Anomaly Detection Decision Making

Anomaly Detection via Controlled Sensing and Deep Active Inference

no code implementations12 May 2021 Geethu Joseph, Chen Zhong, M. Cenk Gursoy, Senem Velipasalar, Pramod K. Varshney

In this paper, we address the anomaly detection problem where the objective is to find the anomalous processes among a given set of processes.

Anomaly Detection Decision Making

Learning-Based UAV Trajectory Optimization with Collision Avoidance and Connectivity Constraints

no code implementations3 Apr 2021 Xueyuan Wang, M. Cenk Gursoy

Unmanned aerial vehicles (UAVs) are expected to be an integral part of wireless networks, and determining collision-free trajectories for multiple UAVs while satisfying requirements of connectivity with ground base stations (GBSs) is a challenging task.

Collision Avoidance Decision Making

How to Attack and Defend NextG Radio Access Network Slicing with Reinforcement Learning

no code implementations14 Jan 2021 Yi Shi, Yalin E. Sagduyu, Tugba Erpek, M. Cenk Gursoy

In this paper, reinforcement learning (RL) for network slicing is considered in NextG radio access networks, where the base station (gNodeB) allocates resource blocks (RBs) to the requests of user equipments and aims to maximize the total reward of accepted requests over time.

Networking and Internet Architecture

Anomaly Detection and Sampling Cost Control via Hierarchical GANs

no code implementations28 Sep 2020 Chen Zhong, M. Cenk Gursoy, Senem Velipasalar

In order to improve the detection accuracy and reduce the delay in detection, we introduce a buffer zone in the operation of the proposed GAN-based detector.

Anomaly Detection Time Series Analysis

Multi-Agent Double Deep Q-Learning for Beamforming in mmWave MIMO Networks

no code implementations13 Aug 2020 Xueyuan Wang, M. Cenk Gursoy

Beamforming is one of the key techniques in millimeter wave (mmWave) multi-input multi-output (MIMO) communications.

Q-Learning

Adversarial jamming attacks and defense strategies via adaptive deep reinforcement learning

no code implementations12 Jul 2020 Feng Wang, Chen Zhong, M. Cenk Gursoy, Senem Velipasalar

As the applications of deep reinforcement learning (DRL) in wireless communications grow, sensitivity of DRL based wireless communication strategies against adversarial attacks has started to draw increasing attention.

Decision Making reinforcement-learning +1

Anomaly Detection Under Controlled Sensing Using Actor-Critic Reinforcement Learning

no code implementations26 May 2020 Geethu Joseph, M. Cenk Gursoy, Pramod K. Varshney

Our objective is to design a sequential sensor selection policy that dynamically determines which processes to observe at each time and when to terminate the detection algorithm.

Anomaly Detection Decision Making +3

Deep Actor-Critic Reinforcement Learning for Anomaly Detection

no code implementations28 Aug 2019 Chen Zhong, M. Cenk Gursoy, Senem Velipasalar

Anomaly detection is widely applied in a variety of domains, involving for instance, smart home systems, network traffic monitoring, IoT applications and sensor networks.

Anomaly Detection reinforcement-learning +1

Power Control for Wireless VBR Video Streaming: From Optimization to Reinforcement Learning

no code implementations31 Mar 2019 Chuang Ye, M. Cenk Gursoy, Senem Velipasalar

Dynamic programming is employed to implement the optimal offline and the initial online power control policies that minimize the transmit power consumption in the communication session.

reinforcement-learning Reinforcement Learning (RL)

Deep Learning Based Power Control for Quality-Driven Wireless Video Transmissions

no code implementations16 Oct 2018 Chuang Ye, M. Cenk Gursoy, Senem Velipasalar

In this paper, wireless video transmission to multiple users under total transmission power and minimum required video quality constraints is studied.

Actor-Critic Deep Reinforcement Learning for Dynamic Multichannel Access

no code implementations8 Oct 2018 Chen Zhong, Ziyang Lu, M. Cenk Gursoy, Senem Velipasalar

We consider the dynamic multichannel access problem, which can be formulated as a partially observable Markov decision process (POMDP).

reinforcement-learning Reinforcement Learning (RL)

Cannot find the paper you are looking for? You can Submit a new open access paper.