Search Results - "Hanawal, Manjesh"
-
1
Learning Optimal Phase-Shifts of Holographic Metasurface Transceivers
Published in IEEE transactions on wireless communications (01-06-2024)“…Holographic metasurface transceivers (HMT) are an emerging technology for enhancing the coverage and rate of wireless communication systems. However, acquiring…”
Get full text
Journal Article -
2
Multi-Player Multi-Armed Bandits for Stable Allocation in Heterogeneous Ad-Hoc Networks
Published in IEEE journal on selected areas in communications (01-10-2019)“…Next generation networks are expected to be ultra-dense and aim to explore spectrum sharing paradigm that allows users to communicate in licensed, shared as…”
Get full text
Journal Article -
3
Zero-Rating of Content and Its Effect on the Quality of Service in the Internet
Published in IEEE/ACM transactions on networking (01-12-2020)“…The ongoing net neutrality debate has generated a lot of heated discussions on whether or not monetary interactions should be regulated between content and…”
Get full text
Journal Article -
4
Almost exact risk budgeting with return forecasts for portfolio allocation
Published in Operations research letters (01-03-2023)“…We revisit the portfolio allocation problem with designated risk-budget. We generalize the problem of arbitrary risk budgets with unequal correlations to one…”
Get full text
Journal Article -
5
Regret of Age-of-Information Bandits
Published in IEEE transactions on communications (01-01-2022)“…We consider a system with a single source that measures/tracks a time-varying quantity and periodically attempts to report these measurements to a monitoring…”
Get full text
Journal Article -
6
FairNet: A Measurement Framework for Traffic Discrimination Detection on the Internet
Published in IEEE eTransactions on network and service management (01-12-2023)“…Network neutrality is related to the nondiscriminatory treatment of packets on the Internet. Any deliberate discrimination of traffic of one application while…”
Get full text
Journal Article -
7
Radar Enhanced Multi-Armed Bandit for Rapid Beam Selection in Millimeter Wave Communications
Published in IEEE communications letters (01-09-2023)“…Multi-arm bandit (MAB) algorithms have been used to learn optimal beams for millimeter wave communication systems. Here, the complexity of learning the optimal…”
Get full text
Journal Article -
8
Profit Sharing Contracts Between Content and Service Providers for Enhanced Network Quality
Published in IEEE eTransactions on network and service management (01-09-2022)“…It has been a long demand of Internet Service Providers (ISPs) that the Content Providers (CPs) share their profits for investments in network infrastructure…”
Get full text
Journal Article -
9
Learning to Optimize Energy Efficiency in Energy Harvesting Wireless Sensor Networks
Published in IEEE wireless communications letters (01-06-2021)“…We study wireless power transmission by an energy source to multiple energy harvesting nodes with the aim to maximize the energy efficiency. The source…”
Get full text
Journal Article -
10
Thwarting Piracy: Anti-debugging Using GPU-assisted Self-healing Codes
Published in 2023 15th International Conference on COMmunication Systems & NETworkS (COMSNETS) (03-01-2023)“…Software piracy is one of the concerns in the IT sector. Pirates leverage the debugger tools to reverse engineer the logic that verifies the license keys or…”
Get full text
Conference Proceeding -
11
Fixed Budget Beam Identification in Millimeter Wave Systems via Unimodal Bandits
Published in 2023 15th International Conference on COMmunication Systems & NETworkS (COMSNETS) (03-01-2023)“…The millimeter-wave communication systems suffer from significant attenuation loss due to their small wavelengths, which significantly reduces the data rate…”
Get full text
Conference Proceeding -
12
Multiplay Multiarmed Bandit Algorithm Based Sensing of Noncontiguous Wideband Spectrum for AIoT Networks
Published in IEEE transactions on industrial informatics (01-05-2022)“…To bring large-scale artificial intelligence of things (AIoT) to reality, wireless networks need intelligence to identify resources in a limited shared…”
Get full text
Journal Article -
13
Evading Malware Analysis Using Reverse Execution
Published in 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS) (04-01-2022)“…Malware is a security threat, and various means are adapted to detect and block them. In this paper, we demonstrate a method where malware can evade malware…”
Get full text
Conference Proceeding -
14
Revenue sharing on the Internet: A case for going soft on neutrality regulations
Published in Performance evaluation (01-01-2021)“…Revenue sharing contracts between Content Providers (CPs) and Internet Service Providers (ISPs) can act as leverage for enhancing the infrastructure of the…”
Get full text
Journal Article -
15
Stochastic Network Utility Maximization with Unknown Utilities: Multi-Armed Bandits Approach
Published in IEEE INFOCOM 2020 - IEEE Conference on Computer Communications (01-07-2020)“…In this paper, we study a novel Stochastic Network Utility Maximization (NUM) problem where the utilities of agents are unknown. The utility of each agent…”
Get full text
Conference Proceeding -
16
Multi-Player Age-of-Information Bandits: A Trekking Approach
Published in 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS) (04-01-2022)“…We study the algorithmic task of scheduling communication in a decentralized manner in a multi-source, single-destination network. The sources share multiple…”
Get full text
Conference Proceeding -
17
Cognitive Networks With In-Band Full-Duplex Radios: Jamming Attacks and Countermeasures
Published in IEEE transactions on cognitive communications and networking (01-03-2020)“…Although in-band full-duplex (IBFD) radios promise to double the throughput of a wireless link, they are more vulnerable to jamming attacks than their…”
Get full text
Journal Article -
18
Unsupervised Online Feature Selection for Cost-Sensitive Medical Diagnosis
Published in 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS) (01-01-2020)“…In medical diagnosis, physicians predict the state of a patient by checking measurements (features) obtained from a sequence of tests, e.g., blood test, urine…”
Get full text
Conference Proceeding -
19
Monitoring COVID Hotspots Using Telecom Data: Voronoi Tessellations for Marking Buffer Zones
Published in 2021 International Conference on COMmunication Systems & NETworkS (COMSNETS) (05-01-2021)“…Human mobility has a strong impact on the spread of epidemics. To control an epidemic, mobility restrictions are enforced in areas that are identified as…”
Get full text
Conference Proceeding -
20
Challenges in Net Neutrality Violation Detection: A Case Study of Wehe Tool
Published in 2021 International Conference on COMmunication Systems & NETworkS (COMSNETS) (05-01-2021)“…The debate on "Net-neutrality" and events pointing towards its possible violations have led to the development of tools to detect deliberate traffic…”
Get full text
Conference Proceeding