no code implementations • 5 Jul 2023 • Tengchan Zeng, Aidin Ferdowsi, Omid Semiari, Walid Saad, Choong Seon Hong
For both cases, solutions using the convergence of communication theory, control theory, and machine learning are proposed to enable effective and secure CAV navigation.
no code implementations • 6 Oct 2021 • Mohammad Aghapour, Aidin Ferdowsi, Walid Saad
In federated learning (FL), a machine learning model is trained on multiple nodes in a decentralized manner, while keeping the data local and not shared with other nodes.
no code implementations • 2 Oct 2021 • Aidin Ferdowsi, David Whitefield
Line of sight satellite systems, unmanned aerial vehicles, high-altitude platforms, and microwave links that operate on frequency bands such as Ka-band or higher are extremely susceptible to rain.
no code implementations • 12 Jul 2021 • Biplav Choudhury, Vijay K. Shah, Aidin Ferdowsi, Jeffrey H. Reed, Y. Thomas Hou
Our simulation results show that DQN-based scheduler outperforms MAF-MAD scheduler and three other baseline schedulers, i. e., Maximal AoI First (MAF), Round Robin (RR) and Random, employed at both hops under general conditions when the network is small (with 10's of IoT devices).
no code implementations • 25 Mar 2021 • Ali Pourranjbar, Georges Kaddoum, Aidin Ferdowsi, Walid Saad
Different from existing works, in this paper, a novel anti-jamming strategy is proposed based on the idea of deceiving the jammer into attacking a victim channel while maintaining the communications of legitimate users in safe channels.
no code implementations • 2 Feb 2021 • Qianqian Zhang, Aidin Ferdowsi, Walid Saad, Mehdi Bennis
To guarantee an efficient learning process, necessary and sufficient conditions for the optimal UAV network topology that maximizes the learning rate for cooperative channel modeling are derived, and the optimal CGAN learning solution per UAV is subsequently characterized, based on the distributed network structure.
no code implementations • 2 Feb 2020 • Aidin Ferdowsi, Walid Saad
In this paper, to address this multi-agent GAN problem, a novel brainstorming GAN (BGAN) architecture is proposed using which multiple agents can generate real-like data samples while operating in a fully distributed manner.
no code implementations • 3 Jun 2019 • Aidin Ferdowsi, Walid Saad
To this end, in this paper, a distributed generative adversarial network (GAN) is proposed to provide a fully distributed IDS for the IoT so as to detect anomalous behavior without reliance on any centralized controller.
no code implementations • 13 Dec 2018 • Aidin Ferdowsi, Samad Ali, Walid Saad, Narayan B. Mandayam
For sensors having a prior information, a DIA detection approach is proposed and an optimal threshold level is derived for the difference between the actual and estimated values of sensors data which enables ACV to stay robust against cyber attacks.
no code implementations • 2 May 2018 • Aidin Ferdowsi, Ursula Challita, Walid Saad, Narayan B. Mandayam
To this end, in this paper, the state estimation process for monitoring AV dynamics, in presence of CP attacks, is analyzed and a novel adversarial deep reinforcement learning (RL) algorithm is proposed to maximize the robustness of AV dynamics control to CP attacks.
no code implementations • 15 Apr 2018 • Ursula Challita, Aidin Ferdowsi, Mingzhe Chen, Walid Saad
Cellular-connected unmanned aerial vehicles (UAVs) will inevitably be integrated into future cellular networks as new aerial mobile users.
no code implementations • 1 Mar 2018 • Aidin Ferdowsi, Walid Saad
In the massive IoT system, due to a large set of available actions for the cloud, it is shown that analytically deriving the MSNE is challenging and, thus, a learning algorithm proposed that converges to the MSNE.
no code implementations • 12 Dec 2017 • Aidin Ferdowsi, Ursula Challita, Walid Saad
However, realizing the true potential of ITSs requires ultra-low latency and reliable data analytics solutions that can combine, in real-time, a heterogeneous mix of data stemming from the ITS network and its environment.
no code implementations • 3 Nov 2017 • Aidin Ferdowsi, Walid Saad
In this paper, a novel deep learning method is proposed for dynamic watermarking of IoT signals to detect cyber attacks.
Information Theory Cryptography and Security Multimedia Information Theory