- Advanced MIMO Systems Optimization
- Cooperative Communication and Network Coding
- Advanced Wireless Communication Technologies
- Energy Harvesting in Wireless Networks
- Wireless Communication Security Techniques
- Cognitive Radio Networks and Spectrum Sensing
- Blind Source Separation Techniques
- Parallel Computing and Optimization Techniques
- Embedded Systems Design Techniques
- Full-Duplex Wireless Communications
- Network Security and Intrusion Detection
- Synthetic Aperture Radar (SAR) Applications and Techniques
- Advanced SAR Imaging Techniques
- Microwave Imaging and Scattering Analysis
- Caching and Content Delivery
- Privacy-Preserving Technologies in Data
- Optical Wireless Communication Technologies
- Antenna Design and Analysis
- Smart Grid Security and Resilience
- Internet Traffic Analysis and Secure E-voting
- Intelligent Tutoring Systems and Adaptive Learning
- Soil Moisture and Remote Sensing
- Microwave Engineering and Waveguides
- Direction-of-Arrival Estimation Techniques
- UAV Applications and Optimization
MIT Lincoln Laboratory
2000-2024
Occidental Petroleum (United States)
2024
Institute for Infocomm Research
2021-2022
Nanyang Technological University
2010-2021
Inje University
2017-2019
Lafayette College
2017-2018
Massachusetts Institute of Technology
2016
University of Houston
2010-2015
PetroVietnam University
2011
Supélec
2004-2006
In modern smart grid networks, the traditional power is empowered by technological advances in sensing, measurement, and control devices with two-way communications between suppliers consumers. The integration helps networks to be smarter, but it also increases risk of attacks because existing obsolete cyber-infrastructure. this article, we focus on bad data injection for grid. basic problem formulation presented, special type stealth attack discussed. Then investigate strategies defenders...
In smart grid, the strong coupling between cyber and physical operations makes power systems vulnerable to attacks. this paper, stealth false data attacks are investigated where attackers without prior knowledge of grid topology, try make inferences through phasor observations. We show that when system dynamics small can be approximated linearly, linear independent component analysis (ICA) applied estimate Jacobian matrix multiplied by eigenvectors covariance state variables. The inferred...
Federated learning allows mobile devices, i.e., workers, to use their local data collaboratively train a global model required by the owner. thus addresses privacy issues of traditional machine learning. However, federated faces energy constraints workers and high network resource cost due fact that number transmissions may be achieve target accuracy. To address constraint, power beacon can used recharges workers. owner need pay an for recharge. cost, WiFi channel, called default...
Wireless backhaul is a cost-effective and flexible alternative to wired backhaul, yet it suffers from unreliability. This paper studies the secrecy performance of relay network with such unreliable wireless backhaul. Bernoulli process adopted model reliability. In network, employing time-switching-based radio frequency harvesting technique aids in forwarding signal best transmitter. An eavesdropper, which able wiretap signals both transmitter relay, uses selection combining maximize its...
In smart grid, the strong coupling between cyber and physical operations makes power systems vulnerable to attacks. this paper, we investigate a new but serious type of attack, stealthy false data attack. addition, demonstrate that attackers are able to, without prior knowledge grid topology, make inferences through phasor observations. For achieve ability, show when change operating conditions is relatively mild can be approximated linearly, linear independent component analysis applied...
Independent component analysis (ICA) is a computational method for separating multivariate signal into subcomponents assuming the mutual statistical independence of non-Gaussian source signals. The classical independent components framework usually assumes linear combinations sources over field real-valued numbers R. In this paper, we investigate binary ICA or mixtures (bICA), which can find applications in many domains including medical diagnosis, multi-cluster assignment, Internet...
In this paper, the impacts of unreliable backhaul links on secrecy performance cooperative single carrier heterogeneous networks in presence eavesdroppers are investigated. A two-phase transmitter/relay selection scheme is proposed, where best transmitter selected to maximize signal-to-noise ratio at relays first phase and relay chosen second minimize signal-to-interference-plus-noise with aid a friendly jammer. Closed-form expressions derived for outage probability, probability non-zero...
Caching and multicast have surged as effective tools to alleviate the heavy load from backhaul links while enabling content-centric delivery in communication networks. The main focus of work this area has been on cache placements manage network delay transmission cost. An important issue optimizing cost efficiency content not addressed. This paper tackles by proposing collaborative beamforming cache-enabled ultra-dense objective is maximize efficiency, which defined ratio throughput sum...
This paper considers a cognitive communication network, which consists of flying base station deployed by an unmanned aerial vehicle (UAV) to serve its multiple downlink ground terminals (GTs), and underlaid device-to-device (D2D) users. To support the GTs' throughput while guaranteeing quality-of-service for D2D users, proposes joint design assignment, bandwidth, power allocation. task poses computationally challenging mixed-binary optimization problem, new computational method solution is...
This paper studies the spectrum allocation problem between service providers (SSPs) and terminals equipped with orthogonal frequency division multiplexing (OFDM) integrated radar communication (IRC) systems. In particular, IRC-equipped such as autonomous vehicles need to buy for their functions, e.g., sensing detecting distant vehicles, transmitting data road-side units. The determine demands from SSPs subject IRC performance requirements, while compete each other on prices attract...
The effects of unreliable backhaul links on cognitive relay networks with best user selection over Nakagami-m fading are investigated. In particular, closed-form expressions for the critical performance metrics derived along asymptotic to obtain insights into impact reliability and multiuser scheduling. Our results demonstrate that link is a key factor imposes limitations networks.
In this article, we investigate the dynamic network service provider (SP) and selection in a user-centric network. Here, services are different combinations of resources. particular, consider an intelligent reflecting surface (IRS)-assisted wireless which mobile users select resources, i.e., transmit power IRS provided by SPs. To analyze SP users, propose to use evolutionary game. game, (players) adjust their selections SPs based on utilities. We model adaptation replicator dynamics...
Federated Learning (FL) as a promising technique is able to address the privacy issues in machine learning. However, due broadcast nature of wireless channel, one key challenges FL its vulnerability security threats. Thus, this paper, we consider model update FL. In particular, propose adopt covert communication with which friendly jammer transmits jamming signals prevent warden from detecting local transmissions mobile devices The use reduces transmission rate devices. formulate an...
Spectrum sensing problem, which focuses on detecting the presence of primary users (PUs) in cognitive radio (CR) network receives much attention recently. In this paper, we introduce PU separation concerns with issue distinguishing and characterizing activities PUs context collaborative spectrum monitor selection. Observations secondary (SUs) are modeled as boolean OR mixtures underlying binary sources. We devise a inference algorithm for separation. With inference, not only PU-SU...
In this paper, we address dynamic network selection problems of mobile users in an intelligent reflecting surface (IRS)-enabled wireless network. particular, the dynamically select different service providers (SPs) and services over time. The are composed adjustable resources IRS transmit power. To formulate SP selection, adopt evolutionary game which able to adapt their selections depending on utilities that they achieve. For this, replicator dynamics is used model adaptation users. allow...
We present a coherent scattering model to determine the forest response an illuminating plane wave in frequency band 20-300 MHz. In this band, at low frequencies, it is well-known that waves penetrate canopy and allow detection of hidden target. have developed based on domain integral representation electric field. A decoupling hypothesis stated validated, allowing significantly reduce numerical complexity problem inherent representations. The simulated scattered field used standard...
Using multicast probes to infer network topologies and internal link/node characteristics is an attractive approach due its bandwidth efficiency suitability for large-scale measurements. In this paper, we propose a new tree inference by exploiting dependence among end-point receivers. We first show that under the assumption of independent failure intermediate nodes or links, inferring topology special instance more general problem binary component analysis (bICA), thus amiable existing...
In this paper, we investigate the impacts of unreliable backhaul connections on cognitive heterogeneous networks with best relay selection. Since spectrum sharing is employed, transmit powers small-cell transmitter and relays are constrained by peak interference at primary user, as well their maximum powers. The closed-form expressions outage probability, ergodic capacity symbol error rate derived along asymptotic performance to get full insights. Our results show that reliability a limiting...
Passive monitoring utilizing distributed wireless sniffers is an effective technique to monitor activities in infrastructure networks for fault diagnosis, resource management, and critical path analysis. In this paper, we introduce a quality of (QoM) metric defined by the expected number active users monitored, investigate problem maximizing QoM judiciously assigning channels based on knowledge user multichannel network. Two types capture models are considered. The user-centric model assumes...
Ground personnel at the tactical edge often lack data and analytics that would increase their effectiveness. To address this problem, work investigates methods to deploy cloud computing capabilities in environments. Our approach is identify representative applications design a system spans software/hardware stack support such while optimizing use of scarce resources. This paper presents our high-level results initial experiments indicate validity approach.
In this paper, the performance of energy harvesting systems in presence unreliable backhaul links is investigated over independent but not necessarily identically distributed (i.n.i.d.) Nakagami-m fading channels. particular, energy-constrained relay uses amount harvested from best small-cell transmitter based on time switching-based relaying (TRS) protocol to process for next hop transmission. We derived closed-form expression outage probability and asymptotic high signal-to-noise ratio...