- Quantum Information and Cryptography
- Quantum Mechanics and Applications
- Quantum Computing Algorithms and Architecture
- Quantum optics and atomic interactions
- Caching and Content Delivery
- Network Security and Intrusion Detection
- Software-Defined Networks and 5G
- Optical Network Technologies
- Cooperative Communication and Network Coding
- Network Traffic and Congestion Control
- Advanced Data Storage Technologies
- Infrastructure Resilience and Vulnerability Analysis
- Advanced Optical Network Technologies
- Opportunistic and Delay-Tolerant Networks
- Complex Network Analysis Techniques
- Cold Atom Physics and Bose-Einstein Condensates
- Mobile Agent-Based Network Management
- Information and Cyber Security
- Cloud Computing and Resource Management
- Smart Grid Security and Resilience
- Photonic and Optical Devices
- IoT and Edge/Fog Computing
- Spectroscopy Techniques in Biomedical and Chemical Research
- Molecular Communication and Nanonetworks
- Internet Traffic Analysis and Secure E-voting
National Institute of Standards and Technology
2017-2025
Communications Technology Laboratory
2022-2024
National Institute of Standards
2021-2024
University of Maryland, College Park
2020-2023
Joint Quantum Institute
2020-2023
Network Technologies (United States)
2021-2022
Information Technology Laboratory
2018-2020
Paris-Est Sup
2018
Université Paris-Est Créteil
2018
Optica
2002
We investigate the coexistence of clock synchronization protocols with quantum signals in a common single-mode optical fiber. By measuring noise between 1500 nm to 1620 we demonstrate potential for up 100 quantum, GHz wide channels coexisting classical signals. Both "White Rabbit" and pulsed laser-based were characterized compared. establish theoretical limit fiber link length channels. The maximal is below approximately km off-the-shelf transceivers can be significantly improved by taking...
This letter considers problems related to suppressing epidemic spread over networks given limited curing resources. The spreading dynamic is captured by a susceptible-infected-susceptible model. threshold and recovery speed are determined the contact network structure heterogeneous infection rates. We develop distributed algorithm that can be used for allocating resources meet three potential objectives: 1) minimize total cost while preventing an epidemic; 2) maximize sufficient resources;...
Optical crosstalk from sub-milliwatt classical-channel power into quantum channels presents a significant challenge in network development, introducing substantial noise that limits the network's performance, scalability, and fidelity. Here we report first demonstration using photon counting optical time-domain reflectometry ({\nu}-OTDR) to precisely identify localize between separate within same fiber fibers. The coexistence of classical signals necessitates use switches for efficient...
This paper presents an advanced framework for real-time monitoring and analysis of network traffic endpoint security in large-scale enterprises by addressing the increasing complexity frequency cyber-attacks. Our Network Security Traffic Analysis Platform employs a comprehensive technology stack including Elastic Stack, ZEEK, Osquery, Kafka, GeoLocation data. By integrating supervised machine learning models trained on UNSW-NB15 dataset, we evaluate Random Forest (RF), Decision Trees (DT),...
The development of prototype metropolitan-scale quantum networks is underway and entails transmitting information via single photons through deployed optical fibers spanning several tens kilometers. major challenges in building are compensation for polarization fluctuation, high-precision clock synchronization, cumulative transmission time fluctuations. One approach addressing these to copropagate classical probe signals the same fiber as signal. Thus, both experience conditions, changes can...
Record low error rates in discrimination of ultra-faint coherent states are achieved by exploring photon detection times available quantum measurements, paving the way to energy-efficient internet future.
The overhead associated with establishing switched virtual circuits (SVCs) in high-speed wide area ATM networks is an important performance factor applications client/server architectures, including the World Wide Web and low-latency such as command/control modeling/simulation. This article quantifies this by describing a benchmarking framework implemented reliable, portable, easily expandable toolset designed to conduct measurements of well-defined parameters metrics on equipment that...
Providing differentiated services to meet the unique requirements of different use cases is a major goal fifth generation (5G) telecommunication networks and will be even more critical for future 6G systems. Fulfilling this requires ability assure quality service (QoS) end (E2E), which remains challenge. A key factor that makes E2E QoS assurance difficult in system access (ANs) core (CNs) manage their resources autonomously. So far, few results have been available can ensure over...
Under the Edge computing umbrella, mobile cloud is an emerging area where two trends come together to compose its major pillars. On one hand, virtualization affecting data centers hypervisors. other device's mobility, especially Smart Phones, which proved be most effective and convenient tools in human life. This then changing game terms of mobility workspaces interaction with connected devices sensors. paper provides a formal specification Mobile component using n-calculus. The proposed...
Federated Learning (FL) has gained popularity as a means of distributed learning using local data samples at clients. However, recent studies showed that FL may experience slow and poor performance when client have different distributions. In this paper, we consider server with access to small dataset, on which it can perform its own learning. This approach is complementary be combined other approaches, e.g., sample sharing among We study demonstrate the benefits proposed via experimental...
In this paper we propose NDN-Trace, a path tracing utility to determine the characteristics of available paths reach given name prefix in NDN-based networks. While traceroute tool IP networks is based on an iterative process, with each iteration incrementally traversing more hops along target, adopt non-iterative approach, process done at application layer. Our design supports multi-path that can be used trace NDN forwarding nodes, applications, or content store caches, while providing...
Cloud services have gained tremendous attention as a utility paradigm and been deployed extensively across wide range of fields. However, security is not catching up to the fast adoption its remains one biggest challenges for Service Providers (CSPs) Consumers (CSCs) from industry, government, academia. These institutions are increasingly faced with threats such DoS/DDoS attacks, ransomware data breaches that affecting confidentiality, integrity, availability cloud system resources. In...
We implement the cyclic quantum receiver based on theoretical proposal of Roy Bondurant and demonstrate experimentally below shot-noise limit (SNL) discrimination quadrature phase-shift keying signals (PSK). also test generalized for longer communication alphabet lengths coherent frequency shift (CFSK) encoding. Using off-the-shelf components, we obtain state error rates that are 3 dB 4.6 SNLs ideal classical receivers PSK CFSK encodings, respectively. The unconditionally surpasses SNL M=8...
We demonstrate the single-shot confidence estimation for individual quantum measurement outcomes using continuous theory of counting process applied to state identification problem. experimentally obtain and average confidences measurements show that they favorably compare idealized classical measurement. Finally, we estimations correctly represent observed experimental a large ensemble measurements.
The development of prototype metropolitan-scale quantum networks is underway and entails transmitting information via single photons through deployed optical fibers spanning several tens kilometers. major challenges in building are compensation polarization mode dispersion, high-precision clock synchronization, for cumulative transmission time fluctuations. One approach addressing these to co-propagate classical probe signals the same fiber as signal. Thus, both experience conditions,...
We study the problem of minimizing (time) average security costs in large networks/systems comprising many interdependent subsystems, where state evolution is captured by a susceptible-infected-susceptible (SIS) model. The reflect investments, economic losses and recovery from infections failures following successful attacks. show that resulting optimization nonconvex propose suite algorithms – two based on convex relaxations, other for finding local minimizer, reduced gradient method...
Because noise is inherent to all measurements, optical communication requires error identification and correction protect recover user data. Yet, correction, routinely used in classical receivers, has not been applied receivers that take advantage of quantum measurement. Here, we show how information uniquely available a measurement can be employed for efficient correction. Our quantum-enabled forward protocol operates on quadrature phase shift keying (QPSK) achieves more than 80 dB...
Abstract We present a systematic study of quantum receivers and modulation methods enabling resource efficient quantum-enhanced optical communication. introduce quantum-inspired schemes that theoretically yield better efficiency than legacy protocols. Experimentally, we demonstrate below the shot-noise limit symbol error rates for M ≤ 16 communication alphabets using software-configurable time-resolving receiver testbed. Further, experimentally verify our boost accuracy practical...
Real-time traffic management and control have become necessary in today's networks due to their complexity cybersecurity risks. With the increase Internet use, threats are more prevalent require real-time detection analysis prevent network intrusions. As number of data flow increases, types attacks increase, which makes detecting intrusions challenging. Therefore, over last years, many researchers focused on different ways detect importantly these In this work, we describe design evaluation...