Virtual Seminar by John M. Shea

Title: AI and Privacy in Collaborative Spectrum Sharing: Perspectives from the Spectrum Collaboration Challenge and Beyond

Date and Time: April 27, 2022 at 10AM ET

Registration Process: Please register at https://tinyurl.com/2p9fus4s

Abstract: Dynamic spectrum access has the potential to greatly improve the utilization of the radio spectrum over existing static allocation techniques. Systems like Citizens Broadband Radio Service (CBRS) are first steps in realizing this vision. However, CBRS is still very limited in its need for centralized coordination (via spectrum access systems) and the potentially long delays (up to 24 hours) in issuing new spectrum grants. In the DARPA Spectrum Collaboration Challenge (SC2), teams performed distributed and collaborative spectrum sharing with spectrum usage patterns changing on time-scales of seconds. This was facilitated by the exchange of information via a collaboration channel, including teams’ usage of spectrum across time and space, as well as information on teams’ performance in delivering traffic. Although this data greatly helps in developing strategies for spectrum use, it also presents risks from both the disclosure of private information and from the potential for manipulating systems’ actions through misreporting. In this talk, I will discuss our experiences in collaborative spectrum sharing during the SC2, our work on applying ML to these problems, and our work on providing privacy in distributed spectrum sensing. I will conclude with a discussion of open problems in these areas.

Bio: John M. Shea is a Professor and the Associate Chair for Academics in the Department of Electrical and Computer Engineering at the University of Florida, where he has been on the faculty since 1999. His research is in the areas of wireless communications and networking, with emphasis on military communications, software-defined radio, networked autonomous systems, and security and privacy in communications. He was co-leader of Team GatorWings, the overall winner of the DARPA Spectrum Collaboration Challenge (DARPA’s fifth grand challenge), in which the teams used software-defined radios to implement intelligent radio networks for collaborative spectrum sharing. He received the Lifetime Achievement Award for Technical Achievement from the IEEE Military Communications Conference (MILCOM) and is a two-time winner of the Ellersick Award from the IEEE Communications Society for the Best Paper in the Unclassified Program of MILCOM. He has been an editor for IEEE Transactions on Wireless Communications, IEEE Wireless Communications magazine, and IEEE Transactions on Vehicular Technology. He is the author of more than 130 refereed journal and conference papers, as well as six book chapters.

About the Monthly Virtual Seminar Series:

The IEEE TCCN Security Special Interest Group conducts a monthly virtual seminar series to highlight the challenges in securing the next generation (xG) wireless networks. The talks will feature cutting edge research addressing both technical and policy issues to advance the state-of-the-art in security techniques, architectures, and algorithms for wireless communications.

Virtual Seminar by Aylin Yener

Title: 6G for Information Security and Information Security for 6G

Date and Time: March 30, 2022 at 11AM ET

Registration Process: Please register at https://tinyurl.com/fh2w9meu

Abstract: 6G is envisioned as the next wireless revolution, introducing novel materials and devices, metrics and requirements, designs and applications of wireless communications, as well as better integration of communications, computing, sensing and learning/AI. Accordingly, new physical layer and network design paradigms are coming into the picture, with the potential of accommodating foundational design advances that can innately secure information. This talk will provide an overview of the directions for information security and privacy relevant to the 6G connected world vision. We will be covering approaches providing information theoretic guarantees and argue their renewed role in the 6G vision. In addition to utilizing the wireless medium for improving communication security, the information theoretic security and privacy lens extends to securing in-network/edge storage. In the former, applications range from networks of devices with heterogeneous capabilities to large sensor or IoT networks. For the latter, applications include content delivery, edge computing and edge learning. We will summarize efforts in these directions and outline future research opportunities.

Bio: Aylin Yener is the Roy and Lois Chope Chair Professor at The Ohio State University and a Professor in the Departments of Electrical and Computer Engineering, Computer Science and Engineering, and Integrated Systems Engineering. Previously, Dr. Yener was a Distinguished Professor and a Dean’s Fellow at Penn State and during which she also held visiting professor appointments at Stanford, and Telecom Paris Tech. Her core expertise areas are in wireless communications, information theory and learning, with interests ranging from physical layer optimization, resource allocation and algorithmic design for wireless, wireless AI, to information security, energy conscious communications, content delivery and edge computing. She received the 2020 IEEE Communications Society Communication Theory Technical Achievement Award, 2019 IEEE Communications Society Best Tutorial Paper Award, 2018 IEEE Communications Society Women in Communications Engineering (WICE) Outstanding Achievement Award, 2014 IEEE Communication Society Marconi Paper Award, 2010 IEEE International Conference on Communications Best Paper award, and several other research and technical awards. She is a fellow of the IEEE.

An active volunteer of the IEEE, Dr. Yener served as the President of the IEEE Information Theory Society in 2020. She has served on the board of governors of the IEEE Information Theory Society since 2012, as the society treasurer, elected member, vice president, and presently as past president. In 2008, she co-founded the North American School of Information Theory which grew to be the largest outreach activity of the society that runs annually in university campuses in North America. Her previous service record includes editorship in ComSoc flagship journals and organization at the track and symposium chair level at ComSoc conferences. She is presently on the senior editorial boards of the IEEE Journal on Selected Areas in Communications, and IEEE Journal on Selected Areas in Information Theory. She serves as an area editor for Security and Privacy for the IEEE Transactions on Information Theory, and is the technical program committee chair for the 2022 IEEE International Symposium on Information Theory.

About the Monthly Virtual Seminar Series:

The IEEE TCCN Security Special Interest Group conducts a monthly virtual seminar series to highlight the challenges in securing the next generation (xG) wireless networks. The talks will feature cutting edge research addressing both technical and policy issues to advance the state-of-the-art in security techniques, architectures, and algorithms for wireless communications.

Virtual Seminar by Marwan Krunz

Title: Machine Learning Classification of RF Signals over Congested and Contested Spectrum: Algorithms and Experimentation

Date and Time: February 23, 2022 at 11AM ET

Registration Process: Please register at https://tinyurl.com/zkvvsjav

Abstract: Machine learning (ML) has recently been applied for the classification of radio frequency (RF) signals. One use case of interest relates to the discernment between different wireless protocols that operate over a shared and potentially contested spectrum. Although highly accurate classifiers have been developed for various wireless scenarios, research points to the vulnerability of such classifiers to adversarial machine learning (AML) attacks. In one such attack, a surrogate deep neural network (DNN) model is trained by the attacker to produce intelligently crafted low power “perturbations” that degrade the classification accuracy of the legitimate classifier. In this talk, I will first present several novel DNN protocol classifiers that our team designed for a shared spectrum environment. These classifiers performed quite well in both simulations and OTA experimentation, considering benign (non-adversarial) noise. I will then present several AML techniques that an attacker may use to generate low power perturbations. When combined with a legitimate signal, these perturbations are shown to uniformly degrade the classification accuracy, even in the very high SNR regime. Different attack models are studied, depending on how much information the attacker has about the defender’s classifier. These models range from a “white-box’” attack (attacker has full knowledge of the defender’s DNN, including its hyperparameters, its training dataset, and even the seeds used to train the network), to a “black-box” attack. Time permitting, I will discuss possible defense mechanisms as well as other research efforts related to detection of adversarial transmissions.

Bio: Marwan Krunz is a Regents Professor at the University of Arizona. He holds the Kenneth VonBehren Endowed Professorship in ECE and is also a professor of computer science. He directs the Broadband Wireless Access and Applications Center (BWAC), a multi-university NSF/industry center that focuses on next-generation wireless technologies. He also holds a courtesy appointment as a professor at University Technology Sydney. Previously, he served as the site director for  the Connection One center. Dr. Krunz’s research is on resource management, network protocols, and security for wireless systems. He has published more than 300 journal articles and peer-reviewed conference papers, and is a named inventor on 12 patents. His latest h-index is 60. He is an IEEE Fellow, an Arizona Engineering Faculty Fellow, and an IEEE Communications Society Distinguished Lecturer (2013-2015). He received the NSF CAREER award. He served as the Editor-in-Chief for the IEEE Transactions on Mobile Computing. He also served as editor for numerous IEEE journals. He was the TPC chair for INFOCOM’04, SECON’05, WoWMoM’06, and Hot Interconnects 9. He was the general vice-chair for WiOpt 2016 and general co-chair for WiSec’12. Dr. Krunz served as chief scientist for two startup companies that focus on 5G and beyond systems and machine learning for wireless communications.

About the Monthly Virtual Seminar Series:

The IEEE TCCN Security Special Interest Group conducts a monthly virtual seminar series to highlight the challenges in securing the next generation (xG) wireless networks. The talks will feature cutting edge research addressing both technical and policy issues to advance the state-of-the-art in security techniques, architectures, and algorithms for wireless communications.

Virtual Seminar by Danijela Cabric

Title: Open Set Wireless Transmitter Authorization: Deep Learning Approaches and Practical Considerations

Date and Time: November 19, 2021 at 11AM ET

Registration Process: Please register at https://tinyurl.com/wh89zv5w

Abstract: As the Internet of Things (IoT) continues to grow, ensuring the security of systems that rely on wireless IoT devices has become critically important. Deep learning-based passive physical layer transmitter authorization systems, referred as RF fingerprinting, have been introduced recently for this purpose. RF fingerprinting approaches use wireless signals directly to verify identity of radio frequency transmitters based on imperfections in their radio hardware. However, most of the existing work using machine learning for RF fingerprinting has mainly focused on classification approaches assuming a closed set of transmitters. In practice, most serious security problems would arise if malicious transmitters outside this closed set are misclassified and authorized. In this talk, we formulate the problem of recognizing authorized transmitters and rejecting new transmitters as open set recognition and anomaly detection. We consider approaches based on one and several binary classifiers, multi-class classifiers, and signal reconstruction, and study how these approaches scale with the number of authorized transmitters. We propose using a known set of unauthorized transmitters to assist the training and study its impact. The authorization robustness against temporal changes in fingerprints is also evaluated as a function of the approach and the dataset structure. For this work, we have created a large Wi-Fi dataset consisting of about 10 million packets sent by 174 off-the-shelf Wi-Fi radios and simultaneously captured by 41 USRPs during 4 captures performed in ORBIT testbed along a month. We have also developed generative deep learning methods to emulate unauthorized signal samples for the augmentation of training datasets. We explored two different data augmentation techniques, one that exploits a limited number of known unauthorized transmitters and the other that does not require any unauthorized transmitters. Our results indicate that data augmentation allows for significant increases in open set classification accuracy, especially when the authorized set is small. Another practical problem in authentication systems based on deep learning is training time when the new transmitters are added. We have developed a fast authentication algorithm based on information retrieval that uses feature vectors as RF fingerprints and locality sensitive hashing(LSH) to create a database that can quickly searched by approximate nearest neighbor algorithm. The proposed algorithm matches the accuracy of deep learning models, while allowing for more than 100x faster retraining.

Bio: Danijela Cabric is Professor in the Electrical and Computer Engineering Department at the University of California, Los Angeles. Her research interests include novel radio architectures, signal processing, communications, machine learning and networking techniques for spectrum sharing, 5G millimeter-wave, massive MIMO and IoT systems. Dr. Cabric received the Samueli Fellowship in 2008, the Okawa Foundation Research Grant in 2009, Hellman Fellowship in 2012, the National Science Foundation Faculty Early Career Development (CAREER) Award in 2012 and Qualcomm Faculty Award in 2020 and 2021. Dr. Cabric is an IEEE Fellow. Her research on deep learning based RF transmitter fingerprinting is supported by SRC/JUMP CONIX center (https://conix.io/).

About the Monthly Virtual Seminar Series:

The IEEE TCCN Security Special Interest Group conducts a monthly virtual seminar series to highlight the challenges in securing the next generation (xG) wireless networks. The talks will feature cutting edge research addressing both technical and policy issues to advance the state-of-the-art in security techniques, architectures, and algorithms for wireless communications.

Virtual Seminar by Walid Saad

Title: Brainstorming Generative Adversarial Networks (BGANs): Framework and Application to Wireless Networks

Date and Time: October 22, 2021 at 10AM EDT

Registration Process: Please register at https://tinyurl.com/2sn8tbwj

Abstract: Due to major communication, privacy, and scalability challenges stemming from the emergence of large-scale Internet of Things services, machine learning is witnessing a major departure from traditional centralized cloud architectures toward a distributed machine learning (ML) paradigm where data is dispersed and processed across multiple edge devices. A prime example of this emerging distributed ML paradigm is Google’s renowned federated learning framework. Despite the tremendous recent interest in distributed ML, remarkably, prior work in the area remains largely focused on the development of distributed ML algorithms for inference and classification tasks. In contrast, in this talk, we introduce the novel framework of brainstorming generative adversarial networks (BGANs) that constitutes one of the first implementations of distributed, multi-agent generative GAN models that does not rely on a centralized parameter server. We show how BGAN allows multiple agents to gain information from one another, in a fully distributed manner, without sharing their real datasets but by “brainstorming” their generated data samples. We then demonstrate the higher accuracy and scalability of BGAN compared to the state of the art through extensive experiments. We then illustrate how BGAN can be used to address key problems in the field of wireless communications by analyzing a millimeter wave channel modeling problem for wireless networks that rely on unmanned aerial vehicles (UAVs). We conclude this talk with an overview on the future outlook of the exciting area of distributed ML and its current and future applications in wireless systems.

Bio: Walid Saad (S’07, M’10, SM’15, F’19) received his Ph.D degree from the University of Oslo in 2010. He is currently a Professor at the Department of Electrical and Computer Engineering at Virginia Tech, where he leads the Network sciEnce, Wireless, and Security (NEWS) laboratory. His research interests include wireless networks, machine learning, game theory, security, unmanned aerial vehicles, cyber-physical systems, and network science. Dr. Saad is a Fellow of the IEEE. He is also the recipient of the NSF CAREER award in 2013 and of the Young Investigator Award from the Office of Naval Research (ONR) in 2015. He was the author/co-author of ten conference best paper awards at WiOpt in 2009, ICIMP in 2010, IEEE WCNC in 2012, IEEE PIMRC in 2015, IEEE SmartGridComm in 2015, EuCNC in 2017, IEEE GLOBECOM in 2018, IFIP NTMS in 2019, IEEE ICC in 2020, and IEEE GLOBECOM in 2020. He is the recipient of the 2015 Fred W. Ellersick Prize from the IEEE Communications Society, of the 2017 IEEE ComSoc Best Young Professional in Academia award, of the 2018 IEEE ComSoc Radio Communications Committee Early Achievement Award, and of the 2019 IEEE ComSoc Communication Theory Technical Committee. He was also a co-author of the 2019 IEEE Communications Society Young Author Best Paper and of the 2021 IEEE Communications Society Young Author Best Paper. He currently serves as an editor for several major IEEE Transactions.

About the Monthly Virtual Seminar Series:

The IEEE TCCN Security Special Interest Group conducts a monthly virtual seminar series to highlight the challenges in securing the next generation (xG) wireless networks. The talks will feature cutting edge research addressing both technical and policy issues to advance the state-of-the-art in security techniques, architectures, and algorithms for wireless communications.

Virtual Seminar by Ekram Hossain

Title: Federated Learning in Unreliable and Resource-Constrained Cellular Wireless Networks

Date: May 26, 2021; Time: 11AM EDT

Registration: Please register at https://albany.zoom.us/meeting/register/tJYvd-irrDMuH9ImDFQ65_9LugOGR4J-fEBg

Abstract: Federated learning is a machine learning setting where the centralized location trains a learning model by using remote devices. Federated learning algorithms cannot be employed in wireless networks unless the unreliable and resource-constrained nature of the wireless medium is taken into account. In this talk, I shall present a federated learning algorithm that is suitable for cellular wireless networks in a real-world scenario. I shall discuss its convergence properties, and the effects of local computation steps and communication steps on its convergence. Through experiments on real and synthetic datasets, I shall demonstrate the convergence of the proposed algorithm.

Bio: Ekram Hossain (IEEE Fellow) is a Professor in the Department of Electrical and Computer Engineering at University of Manitoba, Winnipeg, Canada. He is a Member (Class of 2016) of the College of the Royal Society of Canada, a Fellow of the Canadian Academy of Engineering, and also a Fellow of the Engineering Institute of Canada (http://home.cc.umanitoba.ca/~hossaina). He received his Ph.D. in Electrical Engineering from University of Victoria, Canada, in 2001. Dr. Hossain’s current research interests include design, analysis, and optimization of wireless communication networks (with emphasis on beyond 5G/6G cellular), applied machine learning and game theory, and network economics. He was elevated to an IEEE Fellow “for contributions to spectrum management and resource allocation in cognitive and cellular radio networks”. He was listed as a Clarivate Analytics Highly Cited Researcher in Computer Science in 2017, 2018, 2019, and 2020. Dr. Hossain has won several research awards including the “2017 IEEE Communications Society Best Survey Paper Award, the 2011 IEEE Communications Society Fred Ellersick Prize Paper Award, University of Manitoba Merit Award in 2010, 2013, 2014, and 2015 (for Research and Scholarly Activities), and the IEEE Wireless Communications and Networking Conference 2012 (WCNC’12) Best Paper Award. He received the 2017 IEEE ComSoc TCGCC (Technical Committee on Green Communications & Computing) Distinguished Technical Achievement Recognition Award “for outstanding technical leadership and achievement in green wireless communications and networking”. Currently he serves as the Editor-in-Chief of the IEEE Press and an Editor for IEEE Transactions on Mobile Computing. Previously, he served as an Area Editor for the IEEE Transactions on Wireless Communications in the area of “Resource Management and Multiple Access” (2009-2011) and an Editor for the IEEE Journal on Selected Areas in Communications – Cognitive Radio Series (2011-2014). He serves as the Director of Magazines for the IEEE Communications Society (2020-2021). Dr. Hossain was an elected Member of the Board of Governors of the IEEE Communications Society for the term 2018-2020. He is a Distinguished Lecturer of the IEEE Communications Society. He is a registered Professional Engineer in the province of Manitoba, Canada.

About the Monthly Virtual Seminar Series: The IEEE TCCN Special Interest Group for AI and Machine Learning in Security conducts a monthly virtual seminar series to highlight the challenges in securing the next generation (xG) wireless networks. The talks will feature cutting edge research addressing both technical and policy issues to advance the state-of-the-art in security techniques, architectures, and algorithms for wireless communications.

 

Virtual Seminar by Gene Tsudik

Title: Secure Code Execution on Untrusted Remote Devices

Date: April 28, 2021; Time: 1PM EDT

Registration: Please register using the following link. You will receive a link in your email to attend the talk online.
https://forms.gle/bTah3LEyV5vUxMAw7

Abstract: Our society is increasingly reliant upon a wide range of Cyber-Physical Systems (CPS), Internet-of-Things (IoT), embedded, and so-called “smart” devices. They often perform safety-critical functions in numerous settings, e.g., home, office, medical, automotive and industrial. Some devices are small, cheap and specialized sensors and/or actuators. They tend to have meager resources, run simple software, sometimes upon “bare metal”. If such devices are left unprotected, consequences of forged sensor readings or ignored actuation commands can be catastrophic, particularly, in safety-critical settings. This prompts the following three questions: (1) How to trust data produced by a simple remote embedded device? (2) How to ascertain that this data was produced via execution of expected software? And, (3) Is it possible to attain (1) and (2) under the assumption that all software on the remote device might be modified or compromised? In this talk, we answer these questions by describing APEX: (Verified) Architecture for Proofs of Execution, the first of its kind result for low-end embedded systems. This work has a range of applications, especially, to authenticated sensing and trustworthy actuation, APEX incurs low overhead, making it affordable even for lowest-end embedded devices; it is also publicly available.

Bio: Gene Tsudik is a Distinguished Professor of Computer Science at the University of California, Irvine (UCI). He obtained his PhD in Computer Science from USC in 1991. Before coming to UCI in 2000, he was at the IBM Zurich Research Laboratory (1991-1996) and USC/ISI (1996-2000). His research interests include many topics in security, privacy and applied cryptography. Gene Tsudik is a Fulbright Scholar, Fulbright Specialist (twice), a fellow of ACM, IEEE, AAAS, IFIP and a foreign member of Academia Europaea. From 2009 to 2015 he served as Editor-in-Chief of ACM Transactions on Information and Systems Security (TISSEC, renamed TOPS in 2016). Gene was the recipient of 2017 ACM SIGSAC Outstanding Contribution Award. He is also the author of the first crypto-poem published as a refereed paper.

About the Monthly Virtual Seminar Series:

The IEEE TCCN Security Special Interest Group conducts a monthly virtual seminar series to highlight the challenges in securing the next generation (xG) wireless networks. The talks will feature cutting edge research addressing both technical and policy issues to advance the state-of-the-art in security techniques, architectures, and algorithms for wireless communications.

Virtual Seminar by Yalin Sagduyu

Title: Adversarial Machine Learning for Wireless Security in 5G and Beyond

Date and Time: March 26, 2021 at 10AM ET

Registration Process: Please register using the following link. You will receive a link in your email to attend the talk online.

https://forms.gle/krrmynfr3DDH7ENS9

Abstract: Machine learning provides powerful means to learn from the dynamic spectrum environment and solve complex tasks for wireless communications. Supported by recent advances in algorithmic and computational capabilities, deep learning has emerged as a viable solution to efficiently utilize the limited spectrum resources and optimize wireless communications, with 5G and beyond enhancements to meet the ever-growing demands for high-rate and low-latency communications. As deep learning is becoming a key component in emerging wireless technologies, a new security threat arises due to adversarial machine learning that exploits the vulnerabilities of deep learning to adversarial manipulations. Adversarial machine learning has been applied to different data domains ranging from computer vision to natural language processing. By considering the unique characteristics of the wireless medium, this talk will present adversarial machine learning as a new attack surface for the next-generation communication systems. Novel attack and defense mechanisms built upon adversarial machine learning will be described with examples from signal classification, dynamic spectrum access, and 5G and beyond applications related to spectrum co-existence, user authentication, covert communications, and network slicing. Research challenges and directions will be discussed for effective and safe adoption of much-needed machine learning techniques in the emerging wireless technologies.

Bio: Dr. Yalin Sagduyu is the Director of Networks and Security Division at Intelligent Automation, Inc. (IAI). He received his Ph.D. degree in Electrical and Computer Engineering from University of Maryland, College Park. At IAI, he directs a division of over 50 research scientists and engineers, and executes a broad portfolio of R&D projects on wireless communications, networks, security, machine learning, adversarial machine learning, and 5G and beyond. He has been a Visiting Research Professor in the Electrical and Computer Engineering Department of University of Maryland, College Park. He served as a Conference Track Chair at IEEE PIMRC, IEEE GlobalSIP and IEEE MILCOM, and in the organizing committee of IEEE GLOBECOM. He organized and chaired workshops at IEEE CNS, IEEE ICNP, ACM Mobicom, and ACM WiSec. He received the Best Paper Award at IEEE HST.

About the Monthly Virtual Seminar Series:

The IEEE TCCN Security Special Interest Group conducts a monthly virtual seminar series to highlight the challenges in securing the next generation (xG) wireless networks. The talks will feature cutting edge research addressing both technical and policy issues to advance the state-of-the-art in security techniques, architectures, and algorithms for wireless communications.

Virtual Seminar by Wade Trappe

Title: A Quick Look at New Risks Facing Wireless Systems

Date and Time: February 25, 2021 at 10AM ET

Registration Process: Please register using the following link. You will receive a link in your email to attend the talk online.

https://forms.gle/omTft4DCuuGVtdDz7

Abstract: Wireless networks are susceptible to a wide range of security risks. The evolution from old wireless technologies, such as3G and 802.11, to newer technologies, such as 5G and mmWave, hasnot fundamentally changed the core challenges that undermines the security of wireless networks: Wireless systems are easy to access,the wireless medium is easy to broadcast and eavesdrop on, and the increasingly pervasive nature means that we are becoming increasingly reliant on them for day-to-day functions. This talk will examine a broad sampling of wireless-based threats that will likely become more prevalent as we move towards the next generation of wireless system. These systems are characterized by a closer integration between communications, computation, and the real world. As such, the challenges we face to secure these systems requires that wireless engineers and systems developers think more holistically about how they will design and implement security mechanisms. In short, we must really work to protect our systems “across the stack” and even “into the application.”

Bio: Wade Trappe is a Professor in the Electrical and Computer Engineering Department at Rutgers University, and Associate Director of the Wireless Information Network Laboratory (WINLAB), where he directs WINLAB’s research in wireless security. He has led several federally funded projects in the area of cybersecurity and communication systems, projects involving security and privacy for sensor networks, physical layer security for wireless systems, a security framework for cognitive radios, the development of wireless testbed resources (the ORBIT testbed, www.orbit-lab.org), and new RFID technologies. He was the principal investigator for the original DARPA Spectrum Challenge, in which teams battled for spectrum superiority against each other on the ORBIT testbed arena. His experience in network security and wireless spans over 20 years, and he has co-authored a popular textbook in security, Introduction to Cryptography with Coding Theory, as well as several monographs on wireless security, including Securing Wireless Communications at the Physical Layer and Securing Emerging Wireless Systems: Lower-layer Approaches.

About the Monthly Virtual Seminar Series:

The IEEE TCCN Security Special Interest Group conducts a monthly virtual seminar series to highlight the challenges in securing the next generation (xG) wireless networks. The talks will feature cutting edge research addressing both technical and policy issues to advance the state-of-the-art in security techniques, architectures, and algorithms for wireless communications.

Virtual Seminar by Rose Qingyang Hu

Title: AI and Machine Leaning in Spectrum Sharing Security

Date and Time: January 29, 2021 at 10AM ET

Registration Process: Please register using the following link. You will receive a link in your email to attend the talk online.

https://forms.gle/Ngay2ZvoF4yqEWgCA

Abstract: Dynamic spectrum sharing has been widely considered a key enabler of supporting future wireless networks for massive connectivity and pervasive communications. The complexity and dynamics of the spectrum sharing systems are being exposed to various new attacks, which require novel security and protecting mechanisms that are adaptive, reliable, and scalable. Artificial intelligence and Machine learning based methods have been widely explored to address these issues. In this talk, we will present the recent research advancements in AI/ML based spectrum sharing as well as the corresponding security mechanisms. In particular, we will focus on the state-of-art methodologies for improving the performance of the spectrum sharing communication systems by using AI/ML in different sharing paradigms such as cognitive radio networks, Licensed shared access/spectrum access systems, LTE-U/LAA networks, and ambient backscatter networks. How AI and ML are used to tackle spectrum sharing specific security issues such as primary user emulation attacks, spectrum sensing data falsification attacks, jamming/eavesdrop attacks, privacy issues, as well as how AL/ML can be possibly exploited to launch adversarial attacks in the spectrum sharing systems will be further elaborated. We expect that this talk will highlight the challenges as well as research opportunities in exploring AI and ML techniques to support the ever increasingly important yet complicated spectrum sharing as well as the related security mechanisms.

Bio: Rose Qingyang Hu currently is a Professor of Electrical and Computer Engineering Department and Associate Dean for Research of College of Engineering at Utah State University. Besides more than 12 years’ academia research experience, Prof. Rose Hu has more than 10 years R&D experience with Nortel, Blackberry and Intel as technical manager, senior research scientist, and senior wireless system architect, leading industrial 3G and 4G technology development, 3GPP/IEEE standardization, system level simulation and performance evaluation. Her current research interests include next-generation wireless communications, wireless network design and optimization, Internet of Things and Cyber Physical System, AI/ML, Mobile Edge Computing, wireless security. She has published over 260 papers in leading IEEE journals and conferences and holds over 30 patents in her research areas. Prof. Rose Hu is a Fellow of IEEE, NIST Communication Technology Laboratory Innovator 2020, IEEE Communications Society Distinguished Lecturer 2015-2018, IEEE Vehicular Technology Society Distinguished Lecturer 2020 – 2022, member of Phi Kappa Phi honor society, and recipient of Best Paper Awards from IEEE Globecom 2012, IEEE ICC 2015, IEEE VTC Spring 2016, and IEEE ICC 2016. She serve as TPC Co-Chair for IEEE ICC 2018 and TPC Co-Chair for IEEE Globecom 2023. She is currently serving on the editorial boards for IEEE Transactions on Wireless Communications, IEEE Transactions on Vehicular Technology, IEEE Communications Magazine, IEEE Wireless Communications Magazine.

About the Monthly Virtual Seminar Series:

The IEEE TCCN Security Special Interest Group conducts a monthly virtual seminar series to highlight the challenges in securing the next generation (xG) wireless networks. The talks will feature cutting edge research addressing both technical and policy issues to advance the state-of-the-art in security techniques, architectures, and algorithms for wireless communications.