Sangwoo Moon

ORCID: 0000-0002-4467-4096
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Distributed Control Multi-Agent Systems
  • Robotic Path Planning Algorithms
  • Target Tracking and Data Fusion in Sensor Networks
  • Distributed Sensor Networks and Detection Algorithms
  • Complex Network Analysis Techniques
  • Advanced MIMO Systems Optimization
  • UAV Applications and Optimization
  • Cooperative Communication and Network Coding
  • Misinformation and Its Impacts
  • Opinion Dynamics and Social Influence
  • Neural Networks and Applications
  • Energy Harvesting in Wireless Networks
  • Control and Dynamics of Mobile Robots
  • Blind Source Separation Techniques
  • Mobile Ad Hoc Networks
  • Face and Expression Recognition
  • Spectroscopy and Chemometric Analyses
  • Insect Pheromone Research and Control
  • Energy Efficient Wireless Sensor Networks
  • Network Security and Intrusion Detection
  • Opportunistic and Delay-Tolerant Networks
  • Mobile Crowdsensing and Crowdsourcing
  • Reinforcement Learning in Robotics
  • Robotics and Sensor-Based Localization
  • ICT Impact and Policies

Jet Propulsion Laboratory
2023-2024

California Institute of Technology
2023

Korea Advanced Institute of Science and Technology
2010-2021

Seoul National University
2021

University of Colorado Boulder
2016-2020

Korea Institute of Science & Technology Information
2020

University of Colorado System
2016-2019

University of Tennessee at Knoxville
2006-2015

Korea Air Force Academy
2012-2015

Soongsil University
2001-2003

As high-speed networks are becoming commonplace, it is increasingly challenging to prevent the attack attempts at edge of Internet. While many high-performance intrusion detection systems (IDSes) employ dedicated network processors or special memory meet demanding performance requirements, often increases cost and limits functional flexibility. In contrast, existing software-based IDS stacks fail achieve a high throughput despite modern hardware innovations such as multicore CPUs, manycore...

10.1145/2382196.2382232 article EN Proceedings of the ACM Conference on Computer and Communications Security 2012-10-15

Many real-world reinforcement learning tasks require multiple agents to make sequential decisions under the agents' interaction, where well-coordinated actions among are crucial achieve target goal better at these tasks. One way accelerate coordination effect is enable communicate with each other in a distributed manner and behave as group. In this paper, we study practical scenario when (i) communication bandwidth limited (ii) share medium so that only restricted number of able...

10.48550/arxiv.1902.01554 preprint EN other-oa arXiv (Cornell University) 2019-01-01

This paper presents a novel block-based neural network (BBNN) model and the optimization of its structure weights based on genetic algorithm. The architecture BBNN consists 2D array fundamental blocks with four variable input/output nodes connection weights. Each block can have one different internal configurations depending settings, includes some restrictions such as integer in order to allow easier implementation reconfigurable hardware field programmable logic arrays (FPGA). are encoded...

10.1109/72.914525 article EN IEEE Transactions on Neural Networks 2001-03-01

Continually learning in the real world must overcome many challenges, among which noisy labels are a common and inevitable issue. In this work, we present replay-based continual framework that simultaneously addresses both catastrophic forgetting for first time. Our solution is based on two observations; (i) can be mitigated even with via self-supervised learning, (ii) purity of replay buffer crucial. Building regard, propose key components our method: technique named Self-Replay circumvent...

10.1109/iccv48922.2021.00058 article EN 2021 IEEE/CVF International Conference on Computer Vision (ICCV) 2021-10-01

In this paper, we address the problem of associating mobile stations (MSs) with base (BSs) in an energy-efficient manner. We take a population game approach, which allows tractable analysis many selfish mobiles without growing mathematical complexity. From our game-theoretical analysis, prove that simple power-dependent pricing by operators leads Nash equilibrium to be equal optimal solution social optimization (i.e., no price-of-anarchy). study three evolution dynamics MSs, each expressed...

10.1109/twc.2015.2477297 article EN IEEE Transactions on Wireless Communications 2015-09-08

This paper presents a new hybrid dimensionality reduction method to seek projection through optimization of both structural risk (supervised criterion) and data independence (unsupervised criterion). Classification accuracy is used as metric evaluate the performance method. By minimizing risk, originated from decision boundaries directly improves classification supervised perspective. From an unsupervised perspective, can also be obtained based on maximum among features (or attributes) in...

10.1109/tnnls.2012.2189581 article EN IEEE Transactions on Neural Networks and Learning Systems 2012-03-19

Social networks are the major routes for most individuals to exchange their opinions about new products, social trends and political issues via interactions. It is often of significant importance figure out who initially diffuses information, i.e., finding a rumor source or trend setter. known that such task highly challenging detection probability cannot be beyond 31% regular trees, if we just estimate from given diffusion snapshot. In practice, entails process querying asks "Are you...

10.1109/infocom.2017.8057194 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2017-05-01

Recently, the problem of detecting rumor source in a social network has been much studied, where it shown that detection probability cannot be beyond 31% even for regular trees. In this paper, we study impact an anti-rumor on detection. We first show negative result: anti-rumor's diffusion does not increase under Maximum-Likelihood-Estimator (MLE) when number infected nodes are sufficiently large by passive starts to spread special node, called protector, after is reached rumor. next...

10.1109/icnp.2016.7785329 article EN 2016-11-01

The carrier sense multiple access (CSMA) algorithm has been used in the wireless medium control (MAC) under standard 802.11 implementation due to its simplicity and generality. An extensive body of research on CSMA long made not only context practical protocols, but also a distributed way optimal MAC scheduling. However, current state-of-the-art (or extensions) still suffers from poor performance, especially multi-hop scenarios, often requires patch-based solutions rather than universal...

10.1145/3466772.3467043 article EN 2021-06-29

Although communication is a critical factor of situational awareness and performance on networked sUAS, most simulators do not provide realistic wireless modules. It prevents realizing among multiple UA information sharing, which yields significantly different results compared with actual in the real world. This paper presents communication-realistic simulator to improve more from coordination or cooperative planning/control sUAS. The this based Gazebo/ROS ArduPilot, where...

10.1109/icuas48674.2020.9213892 article EN 2022 International Conference on Unmanned Aircraft Systems (ICUAS) 2020-09-01

This paper presents block-based neural net works (BbNNs) for pattern classification. The BbNN achieves two goals: simultaneous optimization of network structure/weights; and implementation using reconfigurable digital hardware. BbNN, in a 2-D array basic blocks with four variable input/output nodes, successfully solve classification problems. Internal structure is optimized the GA encoding scheme.

10.1109/ijcnn.2002.1005610 article EN 2003-06-25

10.5139/ijass.2009.10.2.001 article EN International Journal of Aeronautical and Space Sciences 2009-11-30

This paper presents a framework for information-theoretic based task assignment of multiple UAVs searching and tracking moving targets. A stochastic approach which uses probability density functions is introduced as the information gathering metric. algorithm yields trajectory that minimizes uncertainty unknown information. The presented on negotiation activated when one defined conditions satisfied. can generate admissible solutions with minimal computational time. Cost computed by each...

10.1109/icuas.2015.7152393 article EN 2022 International Conference on Unmanned Aircraft Systems (ICUAS) 2015-06-01

In active source seeking, a robot takes repeated measurements in order to locate signal cluttered and unknown environment. A key component of an seeking planner is model that can produce estimates the at locations with uncertainty quantification. This allows plan for future Traditionally, this has been form Gaussian process, which difficulty scaling cannot represent obstacles. We propose global local factor graph scale large number obstacles combine extensions highly scalable system...

10.1109/icra48891.2023.10161445 article EN 2023-05-29

This paper presents two approaches considering a distributed framework for joint optimization of sensor coverage target detection and tracking maximizing estimation performance multi-agent systems. The first algorithm is based on the Lloyd algorithm, which uses centroid Voronoi partitions, one workarounds problems. other partition, result assigning to agent control input that maximizes information matrix corresponding state estimate target. Two presented algorithms are compared analyzed in...

10.1109/icuas.2017.7991457 article EN 2022 International Conference on Unmanned Aircraft Systems (ICUAS) 2017-06-01

This paper examines the problem of distributed path planning for a mobile sensor network comprised communication-aware robots performing general information gathering missions. Mutual is derived sensing over packet erasure channels that model multi-hop communication. We as non-cooperative game and derive utility functions are optimized locally by each robot. Each robot computes control input in manner results combined action can be bounded optimal centralized result utilizing sub-modularity...

10.1109/iros.2016.7759290 article EN 2021 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) 2016-10-01

In this paper, we study a problem of detecting the source diffused information by querying individuals, given sample snapshot diffusion graph, where two queries are asked: (i) whether respondent is or not, and (ii) if which neighbor spreads to respondent. We consider case when respondents may not always be truthful some cost taken for each query. Our goal quantify necessary sufficient budgets achieve detection probability 1- δ any 0 <; 1. To end, types algorithms: adaptive non-adaptive ones,...

10.1109/tnet.2020.3009946 article EN IEEE/ACM Transactions on Networking 2020-07-31
Coming Soon ...