Breadcrumb

Publications

Publications based on research from the NC4 Center are listed below.

  1. S. Wu, "Information Security of Wireless Networks with Full-Duplex Radios," Ph.D. dissertation, June 2021.
  2. Vivek Jain, Shixiong Qi and K. K. Ramakrishnan, "Fast Function Instantiation with Alternate Virtualization Approaches," Proc. IEEE International Symposium on Local and Metropolitan Area Net-works, 27th LANMAN (LANMAN 2021), July 2021.
  3. Hua, Y.. Anti-Eavesdropping Channel Estimation Using Multi-Antenna Half-Duplex Radios. In MILCOM 2021-2021 IEEE Military Communications Conference (MILCOM) (pp. 910-915). IEEE, November 2021.
  4. F. Celi, G. Baggio and F. Pasqualetti, "Distributed Learning of Optimal Controls for Linear Systems," IEEE Conference on Decision and Control, Austin, TX, December 2021.
  5. S. Wu and Y. Hua, "Total secrecy from anti-eavesdropping channel estimation," IEEE Transactions on Signal Processing, Vol. 70, pp.1088-1103, Jan 2022.
  6. Neekhara, P., Hussain, S., Du, J., Dubnov, S., Koushanfar, F., & McAuley, J. Cross-modal adversarial reprogramming. In Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision (pp. 2427-2435).  Feb 2022
  7. I. Zabir, A. Swami and Y. Hua, "Secrecy Throughput of ANECE Assisted Transmission of Information in Finite Blocklength," IEEE WCNC'2022, Austin, TX, April 2022
  8. F. Celi and F. Pasqualetti, "Data-driven Meets Geometric Control: Zero Dynamics, Subspace Stabilization, and Malicious Attacks," IEEE Control Systems Letters, April 2022.
  9. H. U. Sami and B. Guler, "Over-the-air Personalized Federated Learning," IEEE Intl. Conf. on Acoustics, Speech and Signal Processing, May 2022.
  10. A. Maksud and Y. Hua, "Physical Layer Encryption for UAV-to-Ground Communications," IEEE ICC'2022, Seoul, Korea, May 2022.
  11. I. Zabir, A. Swami and Y. Hua, "Secrecy Throughput Enhancement with ANECE and Multi-Antenna Beamforming in Finite Blocklength," IEEE ICC'2022, Seoul, Korea, May 2022.
  12. A. Maksud and Y. Hua, "Secret key generation by continuous encryption before quantization,'' IEEE Signal Processing Letters, Vol. 29, pp. 1497-1501, June 2022.
  13. M. Chakraborty, R. Olivares, M. Sridharan, and B. Hassanshahi, "Automatic Root Cause Quantification for Missing Edges in JavaScript Call Graphs," In 36th European Conference on Object-Oriented Programming (ECOOP), June 2022.
  14. Vivek Jain, Hao-Tse Chu, Shixiong Qi, Chia-An Lee, Hung-Cheng Chang, Cheng-Ying Hsieh, K. K. Ramakrishnan, and Jyh-Cheng Chen, "L25GC: a low latency 5G core network based on high-performance NFV platforms," In Proc. of the ACM SIGCOMM 2022 Conference (SIGCOMM '22), Aug. 2022
  15. Hussain, S., Sheybani, N., Neekhara, P., Zhang, X., Duarte, J., & Koushanfar, F.. FastStamp: Accelerating Neural Steganography and Digital Watermarking of Images on FPGAs. In Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design (pp. 1-9).  October 2022
  16. I. Ergun, H. U. Sami and B. Guler, "Communication-Efficient Secure Aggregation for Federated Learning," IEEE Global Communications Conference (Globecom), Dec 2022.
  17. D. Gadginmath and V. Krishnan and F. Pasqualetti, "Direct vs Indirect Methods for Behavior-based Attack Detection," IEEE Conf. on Decision and Control, Dec 2022.
  18. F. Celi and G. Baggio and F. Pasqualetti, "Closed-form Estimates Of The LQR Gain From Finite Data," IEEE Conf. on Decision and Control, Dec 2022.
  19. Y. Hua and A. Maksud, "Continuous Encryption Functions for Security Over Networks," Signal Processing, Vol. 203, Feb. 2023.
  20. J.-W. Chang, M. Javaheripi, S. Hidano, and F. Koushanfar. "RoVISQ: Reduction of Video Service Quality via Adversarial Attacks on Deep Learning-based Video Compression." Annual Network and Distributed System Security Symposium (NDSS), Feb. 2023.
  21. Y. Hua and A. Maksud, "Secret Key Generation from MIMO Channel with or Without Reciprocity", 2023 57th Annual Conference on Information Sciences and Systems, March 2023.
  22. Lu, X., Sami, H. U., & Güler, B. Dropout-Resilient Secure Multi-Party Collaborative Learning with Linear Communication Complexity. In International Conference on Artificial Intelligence and Statistics (pp. 10566-10593). PMLR. April 2023.
  23. Hua, Y., & Maksud, A. Continuous encryption functions for security over networks. Signal Processing, 203, 108807. 2023
  24. Hua, Y. Generalized channel probing and generalized pre-processing for secret key generation. IEEE Transactions on Signal Processing, 71, 1067-1082. 2023
  25. Hua, Y., Liang, Q., & Rahman, M. S. Secure Degree of Freedom of Wireless Networks Using Collaborative Pilots. IEEE Transactions on Signal Processing. 2023
  26. Maksud, A., and Hua, Y., “Second-order analysis of secret-key capacity from a MIMO channel”, IEEE MILCOM’2023, Boston, MA, Oct-Nov 2023.
  27. Celi, F., Baggio, G., & Pasqualetti, F. Distributed data-driven control of network systems. IEEE Open Journal of Control Systems, 2, 93-107. 2023
  28. Celi, F., Baggio, G., & Pasqualetti, F. Data-driven Eigenstructure Assignment for Sparse Feedback Design. IEEE Conf. on Decision and Control, Marina Bay Sands, Singapore. December 2023.
  29. De Persis, C., Gadginmath, D., Pasqualetti, F., Tesi, P. Data-Driven Feedback Linearization with Complete Dictionaries. IEEE Conf. on Decision and Control, Marina Bay Sands, Singapore. December 2023.
  30. Karimipour, N., Pham, J., Clapp, L.  Sridharan, M. Practical Inference of Nullability Types. In 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2023), Dec. 2023. 
  31. Y. Yan, X. Chang, B. Guler, A. Roy-Chowdhury, S.V. Krishnamurthy, A. Swami. Federated Learning for Massive MIMO Power Allocation, Asilomar Conference. October 2023
  32. Lu, X., Sami, H. U., & Güler, B. SCALR: Communication-Efficient Secure Multi-Party Logistic Regression. IEEE Transactions on Communications. 2023
  33. Sami, H. U., & Güler, B. Secure Aggregation for Clustered Federated Learning. In 2023 IEEE International Symposium on Information Theory (ISIT) (pp. 186-191). IEEE. June 2023
  34. Lu, X., & Güler, B. Breaking the Quadratic Communication Overhead of Secure Multi-Party Neural Network Training. In 2023 IEEE International Symposium on Information Theory (ISIT) (pp. 921-926). IEEE. June 2023
  35. Jain, V., Alam, S.M.,  Krishnamurthy, S.V., and Faloutsos, M. (2023)  “C2Store: C2 Server Profiles at Your Fingertips,”  ACM CoNEXT 2023. December 2023

Internal reports and presentations from the center are available here (password protected).