Search Results - "Ferdowsi, Aidin"

Refine Results
  1. 1

    Machine Learning for Wireless Connectivity and Security of Cellular-Connected UAVs by Challita, Ursula, Ferdowsi, Aidin, Chen, Mingzhe, Saad, Walid

    Published in IEEE wireless communications (01-02-2019)
    “…Cellular-connected UAVs will inevitably be integrated into future cellular networks as new aerial mobile users. Providing cellular connectivity to UAVs will…”
    Get full text
    Journal Article
  2. 2

    Neural Combinatorial Deep Reinforcement Learning for Age-Optimal Joint Trajectory and Scheduling Design in UAV-Assisted Networks by Ferdowsi, Aidin, Abd-Elmagid, Mohamed A., Saad, Walid, Dhillon, Harpreet S.

    “…In this article, an unmanned aerial vehicle (UAV)-assisted wireless network is considered in which a battery-constrained UAV is assumed to move towards…”
    Get full text
    Journal Article
  3. 3

    Sleeping Multi-Armed Bandit Learning for Fast Uplink Grant Allocation in Machine Type Communications by Ali, Samad, Ferdowsi, Aidin, Saad, Walid, Rajatheva, Nandana, Haapola, Jussi

    Published in IEEE transactions on communications (01-08-2020)
    “…Scheduling fast uplink grant transmissions for machine type communications (MTCs) is one of the main challenges of future wireless systems. In this paper, a…”
    Get full text
    Journal Article
  4. 4

    Deep Learning for Signal Authentication and Security in Massive Internet-of-Things Systems by Ferdowsi, Aidin, Saad, Walid

    Published in IEEE transactions on communications (01-02-2019)
    “…Secure signal authentication is arguably one of the most challenging problems in the Internet of Things (IoT), due to the large-scale nature of the system and…”
    Get full text
    Journal Article
  5. 5

    Deep Reinforcement Learning for Minimizing Age-of-Information in UAV-Assisted Networks by Abd-Elmagid, Mohamed A., Ferdowsi, Aidin, Dhillon, Harpreet S., Saad, Walid

    “…Unmanned aerial vehicles (UAVs) are expected to be a key component of the next-generation wireless systems. Due to their deployment flexibility, UAVs are being…”
    Get full text
    Conference Proceeding
  6. 6

    Deep Learning-Based Dynamic Watermarking for Secure Signal Authentication in the Internet of Things by Ferdowsi, Aidin, Saad, Walid

    “…Securing the Internet of Things (IoT) is a necessary milestone toward expediting the deployment of its applications and services. In particular, the…”
    Get full text
    Conference Proceeding
  7. 7

    Brainstorming Generative Adversarial Network (BGAN): Toward Multiagent Generative Models With Distributed Data Sets by Ferdowsi, Aidin, Saad, Walid

    Published in IEEE internet of things journal (01-03-2024)
    “…To achieve a high-learning accuracy, generative adversarial networks (GANs) must be fed by large data sets that adequately represent the data space. However,…”
    Get full text
    Journal Article
  8. 8

    Distributed Conditional Generative Adversarial Networks (GANs) for Data-Driven Millimeter Wave Communications in UAV Networks by Zhang, Qianqian, Ferdowsi, Aidin, Saad, Walid, Bennis, Mehdi

    “…In this paper, a novel framework is proposed to perform data-driven air-to-ground channel estimation for millimeter wave (mmWave) communications in an unmanned…”
    Get full text
    Journal Article
  9. 9

    Brainstorming Generative Adversarial Networks (BGANs): Towards Multi-Agent Generative Models With Distributed Datasets by Ferdowsi, Aidin, Saad, Walid

    Published in IEEE internet of things journal (26-09-2023)
    “…To achieve a high learning accuracy, generative adversarial networks (GANs) must be fed by large datasets that adequately represent the data space. However, in…”
    Get full text
    Journal Article
  10. 10

    Reinforcement Learning for Deceiving Reactive Jammers in Wireless Networks by Pourranjbar, Ali, Kaddoum, Georges, Ferdowsi, Aidin, Saad, Walid

    Published in IEEE transactions on communications (01-06-2021)
    “…Conventional anti-jamming methods mostly rely on frequency hopping to hide or escape from jammers. These approaches are not efficient in terms of bandwidth…”
    Get full text
    Journal Article
  11. 11

    Drones in Distress: A Game-Theoretic Countermeasure for Protecting UAVs Against GPS Spoofing by Eldosouky, AbdelRahman, Ferdowsi, Aidin, Saad, Walid

    Published in IEEE internet of things journal (01-04-2020)
    “…One prominent security threat that targets unmanned aerial vehicles (UAVs) is the capture via global positioning system (GPS) spoofing in which an attacker…”
    Get full text
    Journal Article
  12. 12

    Cyber-Physical Security and Safety of Autonomous Connected Vehicles: Optimal Control Meets Multi-Armed Bandit Learning by Ferdowsi, Aidin, Ali, Samad, Saad, Walid, Mandayam, Narayan B.

    Published in IEEE transactions on communications (01-10-2019)
    “…Autonomous connected vehicles (ACVs) rely on intra-vehicle sensors such as camera and radar as well as inter-vehicle communication to operate effectively which…”
    Get full text
    Journal Article
  13. 13

    Convergence of Communications, Control, and Machine Learning for Secure and Autonomous Vehicle Navigation by Zeng, Tengchan, Ferdowsi, Aidin, Semiari, Omid, Saad, Walid, Hong, Choong Seon

    Published in IEEE wireless communications (01-08-2024)
    “…Connected and autonomous vehicles (CAVs) can reduce human errors in traffic accidents, increase road efficiency, and execute various tasks ranging from…”
    Get full text
    Journal Article
  14. 14

    Distributed Generative Adversarial Networks for mmWave Channel Modeling in Wireless UAV Networks by Zhang, Qianqian, Ferdowsi, Aidin, Saad, Walid

    “…In this paper, a novel framework is proposed to enable air-to-ground channel modeling over millimeter wave (mmWave) frequencies in an unmanned aerial vehicle…”
    Get full text
    Conference Proceeding
  15. 15

    Colonel Blotto Game for Sensor Protection in Interdependent Critical Infrastructure by Ferdowsi, Aidin, Saad, Walid, Mandayam, Narayan B.

    Published in IEEE internet of things journal (15-02-2021)
    “…Securing the physical components of a city's interdependent critical infrastructure (ICI), such as power, natural gas, and water systems is a challenging task…”
    Get full text
    Journal Article
  16. 16

    Generative Adversarial Networks for Distributed Intrusion Detection in the Internet of Things by Ferdowsi, Aidin, Saad, Walid

    “…To reap the benefits of the Internet of Things (IoT), it is imperative to secure the system against cyber attacks in order to enable mission critical and…”
    Get full text
    Conference Proceeding
  17. 17

    Interdependence-Aware Game-Theoretic Framework for Secure Intelligent Transportation Systems by Ferdowsi, Aidin, Eldosouky, Abdelrahman, Saad, Walid

    Published in IEEE internet of things journal (15-11-2021)
    “…The operation of future intelligent transportation systems (ITSs), communications infrastructure (CI), and power grids (PGs) will be highly interdependent. In…”
    Get full text
    Journal Article
  18. 18

    Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems by Ferdowsi, Aidin, Challita, Ursula, Saad, Walid, Mandayam, Narayan B.

    “…The dependence of autonomous vehicles (AVs) on sensors and communication links exposes them to cyber-physical (CP) attacks by adversaries that seek to take…”
    Get full text
    Conference Proceeding
  19. 19

    Deep Learning for Rain Fade Prediction in Satellite Communications by Ferdowsi, Aidin, Whitefield, David

    Published in 2021 IEEE Globecom Workshops (GC Wkshps) (01-12-2021)
    “…Line of sight satellite systems, unmanned aerial vehicles, high-altitude platforms, and microwave links that operate on frequency bands such as Ka-band or…”
    Get full text
    Conference Proceeding
  20. 20

    Deep Learning for Rain Fade Prediction in Satellite Communications by Ferdowsi, Aidin, Whitefield, David

    Published 01-10-2021
    “…Line of sight satellite systems, unmanned aerial vehicles, high-altitude platforms, and microwave links that operate on frequency bands such as Ka-band or…”
    Get full text
    Journal Article