no code implementations • 10 Jan 2022 • Tao Hou, Tao Wang, Zhuo Lu, Yao Liu, Yalin Sagduyu
In this research, we propose a novel attack strategy named IoTGAN to manipulate an IoT device's traffic such that it can evade machine learning based IoT device identification.
no code implementations • 9 Dec 2020 • Maice Costa, Yalin Sagduyu, Tugba Erpek, Muriel Médard
We consider a wireless communication network with an adaptive scheme to select the number of packets to be admitted and encoded for each transmission, and characterize the information timeliness.
Information Theory Information Theory H.1.1, E.4