The Internet of Things (IoT) is reshaping modern society by allowing a decent number of RF devices to connect and share information through RF channels. However, such an open nature also brings obstacles to surveillance. For alleviation, a surveillance oracle, or a cognitive communication entity needs to identify and confirm the appearance of known or unknown signal sources in real-time. In this paper, we provide a deep learning framework for RF signal surveillance. Specifically, we jointly integrate the Deep Neural Networks (DNNs) and Quickest Detection (QD) to form a sequential signal surveillance scheme. We first analyze the latent space characteristic of neural network classification models, and then we leverage the response characteris...
The need for Artificial Intelligence algorithms for future Cognitive Radio (CR) systems is unavoidab...
In the era of the Internet of Things (IoT), connected objects produce an enormous amount of data tra...
International audienceIn this paper, we analyze the network attacks that can be launched against Int...
The Internet of Things (IoT) is reshaping modern society by allowing a decent number of RF devices t...
Abnormality detection is essential to the performance of safety-critical and latency-constrained sys...
Safety-critical Cyber-Physical Systems (CPS) require real-time machine learning for control and deci...
The revolutionary idea of the internet of things (IoT) architecture has gained enormous popularity o...
The Internet of Things (IoT) provides applications and services that would otherwise not be possible...
The rapid growth of the Internet of Things (IoT) has brought about a global concern for the security...
Internet of Things (IoT) devices are becoming increasingly popular and an integral part of our every...
Accurate identification of the signal type in shared-spectrum networks is critical for efficient res...
This thesis aims to improve on the current classification capabilities of deep neural networks on tw...
RF fingerprinting is an emerging technology for identifying hardware-specific features of wireless t...
Spectrum sensing in cognitive radio (CR) paradigm can be broadly categorized as analytical-based and...
The revolutionary idea of the internet of things (IoT) architecture has gained enormous popularity ...
The need for Artificial Intelligence algorithms for future Cognitive Radio (CR) systems is unavoidab...
In the era of the Internet of Things (IoT), connected objects produce an enormous amount of data tra...
International audienceIn this paper, we analyze the network attacks that can be launched against Int...
The Internet of Things (IoT) is reshaping modern society by allowing a decent number of RF devices t...
Abnormality detection is essential to the performance of safety-critical and latency-constrained sys...
Safety-critical Cyber-Physical Systems (CPS) require real-time machine learning for control and deci...
The revolutionary idea of the internet of things (IoT) architecture has gained enormous popularity o...
The Internet of Things (IoT) provides applications and services that would otherwise not be possible...
The rapid growth of the Internet of Things (IoT) has brought about a global concern for the security...
Internet of Things (IoT) devices are becoming increasingly popular and an integral part of our every...
Accurate identification of the signal type in shared-spectrum networks is critical for efficient res...
This thesis aims to improve on the current classification capabilities of deep neural networks on tw...
RF fingerprinting is an emerging technology for identifying hardware-specific features of wireless t...
Spectrum sensing in cognitive radio (CR) paradigm can be broadly categorized as analytical-based and...
The revolutionary idea of the internet of things (IoT) architecture has gained enormous popularity ...
The need for Artificial Intelligence algorithms for future Cognitive Radio (CR) systems is unavoidab...
In the era of the Internet of Things (IoT), connected objects produce an enormous amount of data tra...
International audienceIn this paper, we analyze the network attacks that can be launched against Int...