Picture for Narayan B. Mandayam

Narayan B. Mandayam

Space-Time Digitally-Coded Metamaterial Antenna Enabled Directional Modulation for Physical Layer Security

Add code
Nov 16, 2022
Viaarxiv icon

Watch from sky: machine-learning-based multi-UAV network for predictive police surveillance

Add code
Mar 06, 2022
Figure 1 for Watch from sky: machine-learning-based multi-UAV network for predictive police surveillance
Figure 2 for Watch from sky: machine-learning-based multi-UAV network for predictive police surveillance
Figure 3 for Watch from sky: machine-learning-based multi-UAV network for predictive police surveillance
Figure 4 for Watch from sky: machine-learning-based multi-UAV network for predictive police surveillance
Viaarxiv icon

Network Traffic Shaping for Enhancing Privacy in IoT Systems

Add code
Nov 29, 2021
Figure 1 for Network Traffic Shaping for Enhancing Privacy in IoT Systems
Figure 2 for Network Traffic Shaping for Enhancing Privacy in IoT Systems
Figure 3 for Network Traffic Shaping for Enhancing Privacy in IoT Systems
Figure 4 for Network Traffic Shaping for Enhancing Privacy in IoT Systems
Viaarxiv icon

A hybrid model-based and learning-based approach for classification using limited number of training samples

Add code
Jun 25, 2021
Figure 1 for A hybrid model-based and learning-based approach for classification using limited number of training samples
Figure 2 for A hybrid model-based and learning-based approach for classification using limited number of training samples
Figure 3 for A hybrid model-based and learning-based approach for classification using limited number of training samples
Figure 4 for A hybrid model-based and learning-based approach for classification using limited number of training samples
Viaarxiv icon

Estimation of Individual Device Contributions for Incentivizing Federated Learning

Add code
Sep 20, 2020
Figure 1 for Estimation of Individual Device Contributions for Incentivizing Federated Learning
Figure 2 for Estimation of Individual Device Contributions for Incentivizing Federated Learning
Figure 3 for Estimation of Individual Device Contributions for Incentivizing Federated Learning
Figure 4 for Estimation of Individual Device Contributions for Incentivizing Federated Learning
Viaarxiv icon

Learning-Aided Physical Layer Attacks Against Multicarrier Communications in IoT

Add code
Aug 01, 2019
Figure 1 for Learning-Aided Physical Layer Attacks Against Multicarrier Communications in IoT
Figure 2 for Learning-Aided Physical Layer Attacks Against Multicarrier Communications in IoT
Figure 3 for Learning-Aided Physical Layer Attacks Against Multicarrier Communications in IoT
Figure 4 for Learning-Aided Physical Layer Attacks Against Multicarrier Communications in IoT
Viaarxiv icon

Learning-based Resource Optimization in Ultra Reliable Low Latency HetNets

Add code
May 12, 2019
Figure 1 for Learning-based Resource Optimization in Ultra Reliable Low Latency HetNets
Figure 2 for Learning-based Resource Optimization in Ultra Reliable Low Latency HetNets
Figure 3 for Learning-based Resource Optimization in Ultra Reliable Low Latency HetNets
Figure 4 for Learning-based Resource Optimization in Ultra Reliable Low Latency HetNets
Viaarxiv icon

Cyber-Physical Security and Safety of Autonomous Connected Vehicles: Optimal Control Meets Multi-Armed Bandit Learning

Add code
Dec 13, 2018
Figure 1 for Cyber-Physical Security and Safety of Autonomous Connected Vehicles: Optimal Control Meets Multi-Armed Bandit Learning
Figure 2 for Cyber-Physical Security and Safety of Autonomous Connected Vehicles: Optimal Control Meets Multi-Armed Bandit Learning
Figure 3 for Cyber-Physical Security and Safety of Autonomous Connected Vehicles: Optimal Control Meets Multi-Armed Bandit Learning
Figure 4 for Cyber-Physical Security and Safety of Autonomous Connected Vehicles: Optimal Control Meets Multi-Armed Bandit Learning
Viaarxiv icon

Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems

Add code
May 08, 2018
Figure 1 for Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems
Figure 2 for Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems
Figure 3 for Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems
Figure 4 for Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems
Viaarxiv icon