Search Results for author: Narayan B. Mandayam

Found 10 papers, 0 papers with code

Programming Wireless Security through Learning-Aided Spatiotemporal Digital Coding Metamaterial Antenna

no code implementations16 Nov 2022 Alireza Nooraiepour, Shaghayegh Vosoughitabar, Chung-Tse Michael Wu, Waheed U. Bajwa, Narayan B. Mandayam

Physical layer (PHY) security has been put forth as a cost-effective alternative to cryptographic mechanisms that can circumvent the need for explicit key exchange between communication devices, owing to the fact that PHY security relies on the physics of the signal transmission for providing security.

Management

Watch from sky: machine-learning-based multi-UAV network for predictive police surveillance

no code implementations6 Mar 2022 Ryusei Sugano, Ryoichi Shinkuma, Takayuki Nishio, Sohei Itahara, Narayan B. Mandayam

This paper presents the watch-from-sky framework, where multiple unmanned aerial vehicles (UAVs) play four roles, i. e., sensing, data forwarding, computing, and patrolling, for predictive police surveillance.

BIG-bench Machine Learning reinforcement-learning +1

Network Traffic Shaping for Enhancing Privacy in IoT Systems

no code implementations29 Nov 2021 Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam

We show that in special cases the proposed mechanism recovers existing shapers which standardize the output independently from the input.

A hybrid model-based and learning-based approach for classification using limited number of training samples

no code implementations25 Jun 2021 Alireza Nooraiepour, Waheed U. Bajwa, Narayan B. Mandayam

In this paper, a hybrid classification method -- termed HyPhyLearn -- is proposed that exploits both the physics-based statistical models and the learning-based classifiers.

Prosumer Behavior: Decision Making with Bounded Horizon

no code implementations5 Mar 2021 Mohsen Rajabpour, Arnold Glass, Robert Mulligan, Narayan B. Mandayam

Modeling the utility of the prosumer using parameters such as the offered price on a day, the number of energy units the prosumer has available for sale on a day, and the probabilities of the forecast prices, we fit both traditional EUT and the proposed behavioral model with bounded time windows to data collected from 57 homeowners over 68 days in a simulated energy market.

Decision Making

Estimation of Individual Device Contributions for Incentivizing Federated Learning

no code implementations20 Sep 2020 Takayuki Nishio, Ryoichi Shinkuma, Narayan B. Mandayam

Federated learning (FL) is an emerging technique used to train a machine-learning model collaboratively using the data and computation resource of the mobile devices without exposing privacy-sensitive user data.

Federated Learning

Learning-Aided Physical Layer Attacks Against Multicarrier Communications in IoT

no code implementations1 Aug 2019 Alireza Nooraiepour, Waheed U. Bajwa, Narayan B. Mandayam

It is in this vein that PHY spoofing performance of adversaries equipped with supervised and unsupervised ML tools are investigated in this paper.

Disentanglement

Learning-based Resource Optimization in Ultra Reliable Low Latency HetNets

no code implementations12 May 2019 Mohammad Yousefvand, Kenza Hamidouche, Narayan B. Mandayam

Modeling the latency and reliability constraints of users with probabilistic guarantees, the joint problem of user offloading and resource allocation (JUR) in a URLLC setting is formulated as an optimization problem to minimize the cost of serving users for the MBS.

Cyber-Physical Security and Safety of Autonomous Connected Vehicles: Optimal Control Meets Multi-Armed Bandit Learning

no code implementations13 Dec 2018 Aidin Ferdowsi, Samad Ali, Walid Saad, Narayan B. Mandayam

For sensors having a prior information, a DIA detection approach is proposed and an optimal threshold level is derived for the difference between the actual and estimated values of sensors data which enables ACV to stay robust against cyber attacks.

Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems

no code implementations2 May 2018 Aidin Ferdowsi, Ursula Challita, Walid Saad, Narayan B. Mandayam

To this end, in this paper, the state estimation process for monitoring AV dynamics, in presence of CP attacks, is analyzed and a novel adversarial deep reinforcement learning (RL) algorithm is proposed to maximize the robustness of AV dynamics control to CP attacks.

Autonomous Vehicles reinforcement-learning +1

Cannot find the paper you are looking for? You can Submit a new open access paper.