Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleOctober 2022
SphereFed: Hyperspherical Federated Learning
AbstractFederated Learning aims at training a global model from multiple decentralized devices (i.e. clients) without exchanging their private local data. A key challenge is the handling of non-i.i.d. (independent identically distributed) data across ...
- research-articleDecember 2018
Localization Convolutional Neural Networks Using Angle of Arrival Images
2018 IEEE Global Communications Conference (GLOBECOM)Pages 1–7https://doi.org/10.1109/GLOCOM.2018.8647687We introduce localization convolutional neural networks (CNNs), a data-driven time series-based angle of arrival (AOA) localization scheme capable of coping with noise and errors in AOA estimates measured at receiver nodes. Our localization CNNs enhance ...
- research-articleApril 2018
Improving Sar Automatic Target Recognition Using Simulated Images Under Deep Residual Refinements
2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)Pages 2606–2610https://doi.org/10.1109/ICASSP.2018.8462109In recent years, convolutional neural networks (CNNs) have been successfully applied for automatic target recognition (ATR) in synthetic aperture radar (SAR) data. However, it is challenging to train a CNN with high classification accuracy when labeled ...
- research-articleDecember 2017
A Data-Driven Approach to Localization for High Frequency Wireless Mobile Networks
GLOBECOM 2017 - 2017 IEEE Global Communications ConferencePages 1–7https://doi.org/10.1109/GLOCOM.2017.8254732The use of high frequency millimeter wave (mmWave) bands at 28 GHz or higher will be a defining characteristic of next- generation wireless networks, such as 5G and 802.11ad networks. However, communicating over these high frequencies bands often requires ...
- research-articleMarch 2017
Infomax-ICA using Hessian-free optimization
2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)Pages 2537–2541https://doi.org/10.1109/ICASSP.2017.7952614We present HF-ICA, a second-order “Hessian-free” algorithm for Infomax-ICA. Our approach achieves asymptotically quadratic convergence while retaining the memory footprint of first-order methods. Without any hyperparameter tuning, we show ...
-
- research-articleFebruary 2017
Embedded Binarized Neural Networks
EWSN ’17: Proceedings of the 2017 International Conference on Embedded Wireless Systems and NetworksPages 168–173We study embedded Binarized Neural Networks (eBNNs) with the aim of allowing current binarized neural networks (BNNs) in the literature to perform feedforward inference efficiently on small embedded devices. We focus on minimizing the required memory ...
- research-articleDecember 2016
Blind Signal Classification via Sparse Coding
2016 IEEE Global Communications Conference (GLOBECOM)Pages 1–6https://doi.org/10.1109/GLOCOM.2016.7841634Abstract-We propose a novel RF signal classification method based on sparse coding, an unsupervised learning method popular in computer vision. In particular, we employ a convolutional sparse coder that can extract high-level features of an unknown ...
- ArticleOctober 2012
A Chip Architecture for Compressive Sensing Based Detection of IC Trojans
SIPS '12: Proceedings of the 2012 IEEE Workshop on Signal Processing SystemsPages 61–66https://doi.org/10.1109/SiPS.2012.33We present a chip architecture for a compressive sensing based method that can be used in conjunction with the JTAG standard to detect IC Trojans. The proposed architecture compresses chip output resulting from a large number of test vectors applied to ...
- ArticleAugust 2011
DISTROY: detecting integrated circuit Trojans with compressive measurements
Detecting Trojans in an integrated circuit (IC) is an important but hard problem. A Trojan is malicious hardware--it can be extremely small in size and dormant until triggered by some unknown circuit state. To allow wake-up, a Trojan could draw a ...
- ArticleJune 2011
CloudSense: continuous fine-grain cloud monitoring with compressive sensing
Continuous fine-grain status monitoring of a cloud data center enables rapid response to anomalies, but handling the resulting torrent of data poses a significant challenge. As a solution, we propose CloudSense, a new switch design that performs in-...
- articleOctober 2010
A spectral clustering approach to validating sensors via their peers in distributed sensor networks
International Journal of Sensor Networks (IJSNET), Volume 8, Issue 3/4Pages 202–208https://doi.org/10.1504/IJSNET.2010.036195In a distributed sensor network, the goodness of a sensor may change according to its current device status (e.g. health of hardware) and environment (e.g. wireless reception conditions at the sensor location). As a result, it is often necessary to ...
- ArticleOctober 2009
Flowcode: multi-site data exchange over wireless ad-hoc networks using network coding
We present FlowCode, a system that exploits network coding at the granularity of traffic flows to facilitate fault-tolerant data exchange in wireless mesh networks. Applications include multi-site data replication in adhoc environments such as mesh ...
- ArticleOctober 2009
Validating sensors in the field via spectral clustering based on their measurement data
In this paper we introduce a spectral-based method for validating sensor nodes in the field via clustering of sensors based on their measurement data. We formalize the notion of peer consistency in measurement data by introducing a notion called "sensor ...
- research-articleSeptember 2009
Localization with snap-inducing shaped residuals (SISR): coping with errors in measurement
MobiCom '09: Proceedings of the 15th annual international conference on Mobile computing and networkingPages 333–344https://doi.org/10.1145/1614320.1614357We consider the problem of localizing wireless nodes in an outdoor, open-space environment, using ad-hoc radio ranging measurements, e.g., 802.11. We cast these ranging measurements as a set of distance constraints, thus forming an over-determined ...
- ArticleAugust 2009
- ArticleJuly 2008
Use of Content Tags in Managing Advertisements for Online Videos
CECANDEEE '08: Proceedings of the 2008 10th IEEE Conference on E-Commerce Technology and the Fifth IEEE Conference on Enterprise Computing, E-Commerce and E-ServicesPages 249–254https://doi.org/10.1109/CECandEEE.2008.89We consider the problem of managing advertisements (or ads for short) for ad-hoc online videos, such as those generated by end users. We propose a novel ad selection approach based on video tags. We first compute intrinsic values of individual videotags ...
- doctoral_thesisJanuary 2008
Industrial policy, technology advances and industry development: evidence from the chinese software industry
The idea that government should steer economic development by strategically picking and managing certain industries is controversial but appealing to many developing countries that are eager to upgrade their industries. I investigate the impact of ...
- ArticleMarch 2007
Maximizing Throughput of UAV-Relaying Networks with the Load-Carry-and-Deliver Paradigm
Proceedings of the 2007 IEEE Wireless Communications and Networking ConferencePages 4417–4424https://doi.org/10.1109/WCNC.2007.805We consider the task of using one or more unmanned aerial vehicles (UAVs) to relay messages between two distant ground nodes. For delay-tolerant applications like latency-insensitive bulk data transfer, we seek to maximize throughput by having a UAV ...
- doctoral_thesisJanuary 2007
Antenna selection performance in 802.11 networks
In this thesis we explore the use of antenna selection as a new avenue of performance improvement in mobile wireless ad hoc networks. We built an Unmanned Aerial Vehicle (UAV) testbed using commodity dual-antenna 802.11 hardware and performed field ...
- doctoral_thesisJanuary 2007
Maximizing throughput of relay networks using uavs
This thesis investigates two effective system methods for maximizing throughput in practical networks where low-altitude low-speed Unmanned Aerial Vehicles (UAVs) serve as relays for ground nodes. I consider the task of using multiple UAVs to relay ...