no code implementations • 16 Nov 2022 • Alireza Nooraiepour, Shaghayegh Vosoughitabar, Chung-Tse Michael Wu, Waheed U. Bajwa, Narayan B. Mandayam
Physical layer (PHY) security has been put forth as a cost-effective alternative to cryptographic mechanisms that can circumvent the need for explicit key exchange between communication devices, owing to the fact that PHY security relies on the physics of the signal transmission for providing security.
no code implementations • 6 Mar 2022 • Ryusei Sugano, Ryoichi Shinkuma, Takayuki Nishio, Sohei Itahara, Narayan B. Mandayam
This paper presents the watch-from-sky framework, where multiple unmanned aerial vehicles (UAVs) play four roles, i. e., sensing, data forwarding, computing, and patrolling, for predictive police surveillance.
no code implementations • 29 Nov 2021 • Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam
We show that in special cases the proposed mechanism recovers existing shapers which standardize the output independently from the input.
no code implementations • 25 Jun 2021 • Alireza Nooraiepour, Waheed U. Bajwa, Narayan B. Mandayam
In this paper, a hybrid classification method -- termed HyPhyLearn -- is proposed that exploits both the physics-based statistical models and the learning-based classifiers.
no code implementations • 5 Mar 2021 • Mohsen Rajabpour, Arnold Glass, Robert Mulligan, Narayan B. Mandayam
Modeling the utility of the prosumer using parameters such as the offered price on a day, the number of energy units the prosumer has available for sale on a day, and the probabilities of the forecast prices, we fit both traditional EUT and the proposed behavioral model with bounded time windows to data collected from 57 homeowners over 68 days in a simulated energy market.
no code implementations • 20 Sep 2020 • Takayuki Nishio, Ryoichi Shinkuma, Narayan B. Mandayam
Federated learning (FL) is an emerging technique used to train a machine-learning model collaboratively using the data and computation resource of the mobile devices without exposing privacy-sensitive user data.
no code implementations • 1 Aug 2019 • Alireza Nooraiepour, Waheed U. Bajwa, Narayan B. Mandayam
It is in this vein that PHY spoofing performance of adversaries equipped with supervised and unsupervised ML tools are investigated in this paper.
no code implementations • 12 May 2019 • Mohammad Yousefvand, Kenza Hamidouche, Narayan B. Mandayam
Modeling the latency and reliability constraints of users with probabilistic guarantees, the joint problem of user offloading and resource allocation (JUR) in a URLLC setting is formulated as an optimization problem to minimize the cost of serving users for the MBS.
no code implementations • 13 Dec 2018 • Aidin Ferdowsi, Samad Ali, Walid Saad, Narayan B. Mandayam
For sensors having a prior information, a DIA detection approach is proposed and an optimal threshold level is derived for the difference between the actual and estimated values of sensors data which enables ACV to stay robust against cyber attacks.
no code implementations • 2 May 2018 • Aidin Ferdowsi, Ursula Challita, Walid Saad, Narayan B. Mandayam
To this end, in this paper, the state estimation process for monitoring AV dynamics, in presence of CP attacks, is analyzed and a novel adversarial deep reinforcement learning (RL) algorithm is proposed to maximize the robustness of AV dynamics control to CP attacks.