Picture for Aidin Ferdowsi

Aidin Ferdowsi

Convergence of Communications, Control, and Machine Learning for Secure and Autonomous Vehicle Navigation

Add code
Jul 05, 2023
Viaarxiv icon

Two-Bit Aggregation for Communication Efficient and Differentially Private Federated Learning

Add code
Oct 06, 2021
Figure 1 for Two-Bit Aggregation for Communication Efficient and Differentially Private Federated Learning
Figure 2 for Two-Bit Aggregation for Communication Efficient and Differentially Private Federated Learning
Figure 3 for Two-Bit Aggregation for Communication Efficient and Differentially Private Federated Learning
Figure 4 for Two-Bit Aggregation for Communication Efficient and Differentially Private Federated Learning
Viaarxiv icon

Deep Learning for Rain Fade Prediction in Satellite Communications

Add code
Oct 02, 2021
Figure 1 for Deep Learning for Rain Fade Prediction in Satellite Communications
Figure 2 for Deep Learning for Rain Fade Prediction in Satellite Communications
Figure 3 for Deep Learning for Rain Fade Prediction in Satellite Communications
Figure 4 for Deep Learning for Rain Fade Prediction in Satellite Communications
Viaarxiv icon

AoI-minimizing Scheduling in UAV-relayed IoT Networks

Add code
Jul 30, 2021
Figure 1 for AoI-minimizing Scheduling in UAV-relayed IoT Networks
Figure 2 for AoI-minimizing Scheduling in UAV-relayed IoT Networks
Figure 3 for AoI-minimizing Scheduling in UAV-relayed IoT Networks
Figure 4 for AoI-minimizing Scheduling in UAV-relayed IoT Networks
Viaarxiv icon

Reinforcement Learning for Deceiving Reactive Jammers in Wireless Networks

Add code
Mar 25, 2021
Figure 1 for Reinforcement Learning for Deceiving Reactive Jammers in Wireless Networks
Figure 2 for Reinforcement Learning for Deceiving Reactive Jammers in Wireless Networks
Figure 3 for Reinforcement Learning for Deceiving Reactive Jammers in Wireless Networks
Figure 4 for Reinforcement Learning for Deceiving Reactive Jammers in Wireless Networks
Viaarxiv icon

Distributed Conditional Generative Adversarial Networks (GANs) for Data-Driven Millimeter Wave Communications in UAV Networks

Add code
Feb 02, 2021
Figure 1 for Distributed Conditional Generative Adversarial Networks (GANs) for Data-Driven Millimeter Wave Communications in UAV Networks
Figure 2 for Distributed Conditional Generative Adversarial Networks (GANs) for Data-Driven Millimeter Wave Communications in UAV Networks
Figure 3 for Distributed Conditional Generative Adversarial Networks (GANs) for Data-Driven Millimeter Wave Communications in UAV Networks
Figure 4 for Distributed Conditional Generative Adversarial Networks (GANs) for Data-Driven Millimeter Wave Communications in UAV Networks
Viaarxiv icon

Brainstorming Generative Adversarial Networks (BGANs): Towards Multi-Agent Generative Models with Distributed Private Datasets

Add code
Feb 02, 2020
Figure 1 for Brainstorming Generative Adversarial Networks (BGANs): Towards Multi-Agent Generative Models with Distributed Private Datasets
Figure 2 for Brainstorming Generative Adversarial Networks (BGANs): Towards Multi-Agent Generative Models with Distributed Private Datasets
Figure 3 for Brainstorming Generative Adversarial Networks (BGANs): Towards Multi-Agent Generative Models with Distributed Private Datasets
Figure 4 for Brainstorming Generative Adversarial Networks (BGANs): Towards Multi-Agent Generative Models with Distributed Private Datasets
Viaarxiv icon

Generative Adversarial Networks for Distributed Intrusion Detection in the Internet of Things

Add code
Jun 03, 2019
Figure 1 for Generative Adversarial Networks for Distributed Intrusion Detection in the Internet of Things
Figure 2 for Generative Adversarial Networks for Distributed Intrusion Detection in the Internet of Things
Figure 3 for Generative Adversarial Networks for Distributed Intrusion Detection in the Internet of Things
Figure 4 for Generative Adversarial Networks for Distributed Intrusion Detection in the Internet of Things
Viaarxiv icon

Cyber-Physical Security and Safety of Autonomous Connected Vehicles: Optimal Control Meets Multi-Armed Bandit Learning

Add code
Dec 13, 2018
Figure 1 for Cyber-Physical Security and Safety of Autonomous Connected Vehicles: Optimal Control Meets Multi-Armed Bandit Learning
Figure 2 for Cyber-Physical Security and Safety of Autonomous Connected Vehicles: Optimal Control Meets Multi-Armed Bandit Learning
Figure 3 for Cyber-Physical Security and Safety of Autonomous Connected Vehicles: Optimal Control Meets Multi-Armed Bandit Learning
Figure 4 for Cyber-Physical Security and Safety of Autonomous Connected Vehicles: Optimal Control Meets Multi-Armed Bandit Learning
Viaarxiv icon

Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems

Add code
May 08, 2018
Figure 1 for Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems
Figure 2 for Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems
Figure 3 for Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems
Figure 4 for Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems
Viaarxiv icon