Breadcrumb

Publications

Publications based on research from the NC4 Center are listed below.

  1. S. Wu, "Information Security of Wireless Networks with Full-Duplex Radios," Ph.D. dissertation, June 2021.
  2. Vivek Jain, Shixiong Qi and K. K. Ramakrishnan, "Fast Function Instantiation with Alternate Virtualization Approaches," Proc. IEEE International Symposium on Local and Metropolitan Area Net-works, 27th LANMAN (LANMAN 2021), July 2021.
  3. Hua, Y.. Anti-Eavesdropping Channel Estimation Using Multi-Antenna Half-Duplex Radios. In MILCOM 2021-2021 IEEE Military Communications Conference (MILCOM) (pp. 910-915). IEEE, November 2021.
  4. F. Celi, G. Baggio and F. Pasqualetti, "Distributed Learning of Optimal Controls for Linear Systems," IEEE Conference on Decision and Control, Austin, TX, December 2021.
  5. S. Wu and Y. Hua, "Total secrecy from anti-eavesdropping channel estimation," IEEE Transactions on Signal Processing, Vol. 70, pp.1088-1103, Jan 2022.
  6. Neekhara, P., Hussain, S., Du, J., Dubnov, S., Koushanfar, F., & McAuley, J. Cross-modal adversarial reprogramming. In Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision (pp. 2427-2435).  Feb 2022
  7. I. Zabir, A. Swami and Y. Hua, "Secrecy Throughput of ANECE Assisted Transmission of Information in Finite Blocklength," IEEE WCNC'2022, Austin, TX, April 2022
  8. F. Celi and F. Pasqualetti, "Data-driven Meets Geometric Control: Zero Dynamics, Subspace Stabilization, and Malicious Attacks," IEEE Control Systems Letters, April 2022.
  9. H. U. Sami and B. Guler, "Over-the-air Personalized Federated Learning," IEEE Intl. Conf. on Acoustics, Speech and Signal Processing, May 2022.
  10. A. Maksud and Y. Hua, "Physical Layer Encryption for UAV-to-Ground Communications," IEEE ICC'2022, Seoul, Korea, May 2022.
  11. I. Zabir, A. Swami and Y. Hua, "Secrecy Throughput Enhancement with ANECE and Multi-Antenna Beamforming in Finite Blocklength," IEEE ICC'2022, Seoul, Korea, May 2022.
  12. A. Maksud and Y. Hua, "Secret key generation by continuous encryption before quantization,'' IEEE Signal Processing Letters, Vol. 29, pp. 1497-1501, June 2022.
  13. M. Chakraborty, R. Olivares, M. Sridharan, and B. Hassanshahi, "Automatic Root Cause Quantification for Missing Edges in JavaScript Call Graphs," In 36th European Conference on Object-Oriented Programming (ECOOP), June 2022.
  14. Vivek Jain, Hao-Tse Chu, Shixiong Qi, Chia-An Lee, Hung-Cheng Chang, Cheng-Ying Hsieh, K. K. Ramakrishnan, and Jyh-Cheng Chen, "L25GC: a low latency 5G core network based on high-performance NFV platforms," In Proc. of the ACM SIGCOMM 2022 Conference (SIGCOMM '22), Aug. 2022
  15. Hussain, S., Sheybani, N., Neekhara, P., Zhang, X., Duarte, J., & Koushanfar, F.. FastStamp: Accelerating Neural Steganography and Digital Watermarking of Images on FPGAs. In Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design (pp. 1-9).  October 2022
  16. I. Ergun, H. U. Sami and B. Guler, "Communication-Efficient Secure Aggregation for Federated Learning," IEEE Global Communications Conference (Globecom), Dec 2022.
  17. D. Gadginmath and V. Krishnan and F. Pasqualetti, "Direct vs Indirect Methods for Behavior-based Attack Detection," IEEE Conf. on Decision and Control, Dec 2022.
  18. F. Celi and G. Baggio and F. Pasqualetti, "Closed-form Estimates Of The LQR Gain From Finite Data," IEEE Conf. on Decision and Control, Dec 2022.
  19. Y. Hua and A. Maksud, "Continuous Encryption Functions for Security Over Networks," Signal Processing, Vol. 203, Feb. 2023.
  20. J.-W. Chang, M. Javaheripi, S. Hidano, and F. Koushanfar. "RoVISQ: Reduction of Video Service Quality via Adversarial Attacks on Deep Learning-based Video Compression." Annual Network and Distributed System Security Symposium (NDSS), Feb. 2023.
  21. Y. Hua and A. Maksud, "Secret Key Generation from MIMO Channel with or Without Reciprocity", 2023 57th Annual Conference on Information Sciences and Systems, March 2023.
  22. Lu, X., Sami, H. U., & Güler, B. Dropout-Resilient Secure Multi-Party Collaborative Learning with Linear Communication Complexity. In International Conference on Artificial Intelligence and Statistics (pp. 10566-10593). PMLR. April 2023.
  23. Hua, Y., & Maksud, A. Continuous encryption functions for security over networks. Signal Processing, 203, 108807. 2023
  24. Hua, Y. Generalized channel probing and generalized pre-processing for secret key generation. IEEE Transactions on Signal Processing, 71, 1067-1082. 2023
  25. Hua, Y., Liang, Q., & Rahman, M. S. Secure Degree of Freedom of Wireless Networks Using Collaborative Pilots. IEEE Transactions on Signal Processing. 2023
  26. Maksud, A., and Hua, Y., “Second-order analysis of secret-key capacity from a MIMO channel”, IEEE MILCOM’2023, Boston, MA, Oct-Nov 2023.
  27. Celi, F., Baggio, G., & Pasqualetti, F. Distributed data-driven control of network systems. IEEE Open Journal of Control Systems, 2, 93-107. 2023
  28. Celi, F., Baggio, G., & Pasqualetti, F. Data-driven Eigenstructure Assignment for Sparse Feedback Design. IEEE Conf. on Decision and Control, Marina Bay Sands, Singapore. December 2023.
  29. De Persis, C., Gadginmath, D., Pasqualetti, F., Tesi, P. Data-Driven Feedback Linearization with Complete Dictionaries. IEEE Conf. on Decision and Control, Marina Bay Sands, Singapore. December 2023.
  30. Karimipour, N., Pham, J., Clapp, L.  Sridharan, M. Practical Inference of Nullability Types. In 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2023), Dec. 2023. 
  31. Y. Yan, X. Chang, B. Guler, A. Roy-Chowdhury, S.V. Krishnamurthy, A. Swami. Federated Learning for Massive MIMO Power Allocation, Asilomar Conference. October 2023
  32. Lu, X., Sami, H. U., & Güler, B. SCALR: Communication-Efficient Secure Multi-Party Logistic Regression. IEEE Transactions on Communications. 2023
  33. Sami, H. U., & Güler, B. Secure Aggregation for Clustered Federated Learning. In 2023 IEEE International Symposium on Information Theory (ISIT) (pp. 186-191). IEEE. June 2023
  34. Lu, X., & Güler, B. Breaking the Quadratic Communication Overhead of Secure Multi-Party Neural Network Training. In 2023 IEEE International Symposium on Information Theory (ISIT) (pp. 921-926). IEEE. June 2023
  35. Jain, V., Alam, S.M.,  Krishnamurthy, S.V., and Faloutsos, M. (2023)  “C2Store: C2 Server Profiles at Your Fingertips,”  ACM CoNEXT 2023. December 2023 
  36. Y. Hua and A. Maksud, "Secret-Key Capacity from MIMO Channel Probing,"  IEEE Wireless Communications Letters, March 2024.
  37. Q. M. Alam, I. Haque, and N. Abu-Ghazaleh, "Learn-to-Compress (LtC): Efficient Learning Based Video Analytics,"  IEEE/IFIP Network Operations and Management Symposium, Seoul, South Korea, May 2024
  38. K. Zheng, W. Zhao, T. Woodford, R. Zhao, X. Zhang, Y. Hua, "Enhancing mmWave Radar Sensing Using a Phased-MIMO Architecture'', June 2024. 
  39. Y. Hua and M. S. Rahman, "Unification of Secret Key Generation and Wiretap Channel Transmission'', IEEE ICC, Denver, CO, USA, June 2024.
  40. H. Us Sami, B. Guler, “Over-the-air Clustered Federated Learning”, IEEE Transactions on Wireless Communications, July 2024.  
  41. Y. Hua, M. S. Rahman, and A. Swami, "A method for low-latency secure multiple access,'' IEEE LANMAN'2024, July 2024.
  42. H. Us Sami, B. Guler, ''Secure Aggregation for Clustered Federated Learning with Passive Adversaries'', IEEE Transactions on Communications, July 2024. 
  43. X. Lu, H. Us Sami, B. Guler, “Privacy-preserving Collaborative Learning with Linear Communication Complexity”, IEEE Transactions on Information Theory, August 2024. 
  44. M. Chakraborty, A. Gnanakumar, M. Sridharan, A. Møller, ''Indirection-Bounded Call Graph Analysis.'' 2024 European Conference on Object-Oriented Programming, September 2024. 
  45. X. A. Zhou, Q. Deng, J. Pu, K. Man, Z. Qian and S. Krishnamurthy, ''Untangling the Knot: Breaking Access Control in Home Wireless Mesh Networks'' ACM Conference on Computer and Communications Security (CCS), October 2024.
  46. H. Us Sami, B. Guler, “Secure Gradient Aggregation with Sparsification for Resource-Limited Federated Learning”, IEEE Transactions on Communications, November 2024.
  47. Z. Liu, Q. Deng, Z. Tan, Z. Qian, X.Zhang, A. Swami and S.V. Krishnamurthy, "M2HO: Mitigating the Adverse Affects of 5G RF-millimeter Wave  Handovers on TCP,"  ACM MobiCom 2024, November 2024.
  48. Zihao Feng, Xingyu Chen, Xuyang Cao, Xinyu Zhang, “Hybrid Data-Driven and Simulation-Driven Prediction of mmWave Network Performance”, 7th International Workshop on Physics Embedded AI Solutions in Mobile Computing (MobiCom Picasso Workshop), November 2024
  49. D. Gadginmath and V. Krishnan and F. Pasqualetti, “Data-Driven Feedback Linearization using the Koopman Generator.” IEEE Transactions on Automatic Control, December 2024.
  50. X. Chang, F. Niloy, Sk. M. Ahmed, S. Krishnamurthy, B. Guler, A. Swami, S. Oymak, A. Roy-Chowdhury, “AdMiT: Adaptive Multi-Source Tuning in Dynamic Environments", IEEE/CVF Conf. on Computer Vision and Pattern Recognition, 2025.
  51. J.W. Chang, K. Sun, N. Heydaribeni, S. Hidano, X. Zhang, F. Koushanfar, “Magmaw: Modality-Agnostic Adversarial Attacks on Machine Learning-Based Wireless Communication Systems”, Annual Network and Distributed System Security Symposium (NDSS), Feb 2025.
  52. J.W. Chang, K. Sun, D. Xia, X. Zhang, F. Koushanfar, “EveGuard: Defeating Vibration-based Side-Channel Eavesdropping with Audio Adversarial Perturbations”, IEEE Symposium on Security and Privacy (S&P), May 2025.
  53. Y. Yan, X. Chang, A. Roy-Chowdhury, S. Krishnamurthy, A. Swami, B. Guler, Clustered Federated Learning for Massive MIMO Power Allocation, IEEE Military Communications Conference (MILCOM), 2024.
  54. H. U. Sami, S. Sen, A. Roy-Chowdhury, S. Krishnamurthy, B. Guler, Gradient Inversion Attacks on Parameter-Efficient Fine-Tuning, IEEE/CVF Conf. on Computer Vision and Pattern Recognition, 2025.

Internal reports and presentations from the center are available here (password protected).