no code implementations • 12 Jan 2023 • Yi Shi, Yalin E. Sagduyu, Tugba Erpek
We show that the DFL performance can be significantly reduced by jamming attacks launched in a wireless network and characterize the attack surface as a vulnerability study before the safe deployment of DFL over wireless networks.
no code implementations • 27 Dec 2022 • Yi Shi, Yalin E. Sagduyu
In this paper, we present a generative adversarial network (GAN) approach to generate synthetic sensing results to augment the training data for the deep learning classifier so that the sensing time can be reduced (and thus the transmission time can be increased) while keeping high accuracy of the classifier.
no code implementations • 8 Oct 2022 • Yi Shi, Jiang Wu, Shixuan Zhao, Gangyao Gao, Tao Deng, Hongmei Yan
The first is the detection head and object distribution matching strategy, which guides the rational configuration of detection head, so as to leverage multi-scale features to effectively detect objects at vastly different scales.
no code implementations • CVPR 2022 • Han-Jia Ye, Yi Shi, De-Chuan Zhan
To this end, we introduce a novel evaluation criterion by predicting the comparison's correctness after assigning the learned embeddings to their optimal conditions, which measures how much WS-CSL could cover latent semantics as the supervised model.
no code implementations • 6 Apr 2022 • Yi Shi, Yalin E. Sagduyu, Tugba Erpek
In this paper, distributed federated learning over a multi-hop wireless network is considered to collectively train a DNN for signal identification.
no code implementations • 13 Jan 2022 • Yi Shi, Yalin E. Sagduyu
Federated learning (FL) offers a decentralized learning environment so that a group of clients can collaborate to train a global model at the server, while keeping their training data confidential.
no code implementations • 26 Oct 2021 • Di wu, Yi Shi, Ziyu Wang, Jie Yang, Mohamad Sawan
Although compressive sensing (CS) can be adopted to compress the signals to reduce communication bandwidth requirement, it needs a complex reconstruction procedure before the signal can be used for seizure prediction.
no code implementations • 15 Oct 2021 • Chris McKennan, Zhe Sang, Yi Shi
To address these issues, we then develop a novel framework and method that treats peptide-spectrum matching as a Bayesian model selection problem with an incomplete model space, which are, to our knowledge, the first to account for all sources of PSM error without relying on the aforementioned assumptions.
no code implementations • 16 Sep 2021 • Brian Kim, Yi Shi, Yalin E. Sagduyu, Tugba Erpek, Sennur Ulukus
The DNN that corresponds to a regression model is trained with channel gains as the input and returns transmit powers as the output.
no code implementations • 22 Jul 2021 • Yi Shi, Yalin E. Sagduyu
An over-the-air membership inference attack (MIA) is presented to leak private information from a wireless signal classifier.
no code implementations • 26 Mar 2021 • Congyi Wang, Yu Chen, Bin Wang, Yi Shi
GAN-based neural vocoders, such as Parallel WaveGAN and MelGAN have attracted great interest due to their lightweight and parallel structures, enabling them to generate high fidelity waveform in a real-time manner.
no code implementations • 1 Feb 2021 • Yi Shi, Congyi Wang, Yu Chen, Bin Wang
In this paper, we propose a novel semi-supervised learning (SSL) framework for Mandarin Chinese polyphone disambiguation that can potentially leverage unlimited unlabeled text data.
no code implementations • 21 Jan 2021 • Yi Shi, Yalin E. Sagduyu
We show that the portion of the reward achieved by real requests may be much less than the reward that would be achieved when there was no attack.
no code implementations • 14 Jan 2021 • Yi Shi, Yalin E. Sagduyu, Tugba Erpek, M. Cenk Gursoy
In this paper, reinforcement learning (RL) for network slicing is considered in NextG radio access networks, where the base station (gNodeB) allocates resource blocks (RBs) to the requests of user equipments and aims to maximize the total reward of accepted requests over time.
Networking and Internet Architecture
no code implementations • 7 Jan 2021 • Yalin E. Sagduyu, Tugba Erpek, Yi Shi
For the second attack, the adversary spoofs wireless signals with the generative adversarial network (GAN) to infiltrate the physical layer authentication mechanism based on a deep learning classifier that is deployed at the 5G base station.
no code implementations • 14 Sep 2020 • Yi Shi, Yalin E. Sagduyu, Tugba Erpek
The paper presents a reinforcement learning solution to dynamic resource allocation for 5G radio access network slicing.
no code implementations • 27 Aug 2020 • Sudeep Fadadu, Shreyash Pandey, Darshan Hegde, Yi Shi, Fang-Chieh Chou, Nemanja Djuric, Carlos Vallespi-Gonzalez
Our model builds on a state-of-the-art Bird's-Eye View (BEV) network that fuses voxelized features from a sequence of historical LiDAR data as well as rasterized high-definition map to perform detection and prediction tasks.
no code implementations • 25 Jun 2020 • Yi Shi, Kemal Davaslioglu, Yalin E. Sagduyu
As machine learning (ML) algorithms are used to process wireless signals to make decisions such as PHY-layer authentication, the training data characteristics (e. g., device-level information) and the environment conditions (e. g., channel information) under which the data is collected may leak to the ML model.
no code implementations • 17 Jun 2020 • Lingjing Wang, Yi Shi, Xiang Li, Yi Fang
Global registration of point clouds aims to find an optimal alignment of a sequence of 2D or 3D point sets.
1 code implementation • CVPR 2020 • Yi Shi, Mengchen Xu, Shuaihang Yuan, Yi Fang
This paper proposes a novel probabilistic framework for the learning of unsupervised deep shape descriptors with point distribution learning.
no code implementations • 12 May 2020 • Tugba Erpek, Timothy J. O'Shea, Yalin E. Sagduyu, Yi Shi, T. Charles Clancy
Existing communication systems exhibit inherent limitations in translating theory to practice when handling the complexity of optimization for emerging wireless applications with high degrees of freedom.
no code implementations • 24 Jan 2020 • Yalin E. Sagduyu, Yi Shi, Tugba Erpek, William Headley, Bryse Flowers, George Stantchev, Zhuo Lu
Wireless systems are vulnerable to various attacks such as jamming and eavesdropping due to the shared and broadcast nature of wireless medium.
no code implementations • 1 Nov 2019 • Yalin E. Sagduyu, Yi Shi, Tugba Erpek
A transmitter applies deep learning on its spectrum sensing results to predict idle time slots for data transmission.
no code implementations • 13 Oct 2019 • Nof Abuzainab, Tugba Erpek, Kemal Davaslioglu, Yalin E. Sagduyu, Yi Shi, Sharon J. Mackey, Mitesh Patel, Frank Panettieri, Muhammad A. Qureshi, Volkan Isler, Aylin Yener
The problem of quality of service (QoS) and jamming-aware communications is considered in an adversarial wireless network subject to external eavesdropping and jamming attacks.
no code implementations • 25 Sep 2019 • Yi Shi, Kemal Davaslioglu, Yalin E. Sagduyu, William C. Headley, Michael Fowler, Gilbert Green
Dynamic spectrum access (DSA) benefits from detection and classification of interference sources including in-network users, out-network users, and jammers that may all coexist in a wireless network.
no code implementations • 31 May 2019 • Yalin E. Sagduyu, Yi Shi, Tugba Erpek
While there is a surge of interest to understand the security issues of machine learning, their implications have not been understood yet for wireless applications such as those in IoT systems that are susceptible to various attacks due the open and broadcast nature of wireless communications.
no code implementations • 3 May 2019 • Yi Shi, Kemal Davaslioglu, Yalin E. Sagduyu
Building upon deep learning techniques, this paper introduces a spoofing attack by an adversary pair of a transmitter and a receiver that assume the generator and discriminator roles in the GAN and play a minimax game to generate the best spoofing signals that aim to fool the best trained defense mechanism.
no code implementations • 26 Jan 2019 • Yi Shi, Tugba Erpek, Yalin E. Sagduyu, Jason H. Li
We consider the case that a cognitive transmitter senses the spectrum and transmits on idle channels determined by a machine learning algorithm.
no code implementations • 25 Jan 2019 • Yi Shi, Yalin E. Sagduyu, Kemal Davaslioglu, Jason H. Li
The exploratory attack with limited training data is shown to fail to reliably infer the target classifier of a real text classifier API that is available online to the public.
no code implementations • 5 Nov 2018 • Yi Shi, Yalin E. Sagduyu, Kemal Davaslioglu, Jason H. Li
To mitigate the impact of limited training data, we develop an active learning approach that first builds a classifier based on a small number of API calls and uses this classifier to select samples to further collect their labels.
no code implementations • 3 Jul 2018 • Tugba Erpek, Yalin E. Sagduyu, Yi Shi
An adversarial machine learning approach is introduced to launch jamming attacks on wireless communications and a defense strategy is presented.
1 code implementation • 12 Dec 2016 • Xiaofang Wang, Yi Shi, Kris M. Kitani
The current state-of-the-art deep hashing method DPSH~\cite{li2015feature}, which is based on pairwise labels, performs image feature learning and hash code learning simultaneously by maximizing the likelihood of pairwise similarities.