Home  Image result for nsf logo  Image result for international technology alliance logo    Image result

Funded Projects

Develop reconnaissance techniques to infer internal policies and states of a software defined network from compromised/malicious hosts and switches, and demonstrate the impacts of leaking such information via the design of intelligent attacks against target components (e.g., flow table, control application).

Related publications: INFOCOM’20.b, SecureComm’20

Develop mechanisms to model cascading failures in interdependent power-communication networks, to minimize damage during cascading by preventive control, and to maximize restored services during recovery under limited resources and uncertainty.

Related publications: ISGT-Europe’20, SmartGridComm’20

News: Top Stories of Penn State Today, EECS news 2019

Quantify the vulnerability of existing network tomography algorithms in an adversarial setting, including (i) developing optimal attack strategies for representative tomography algorithms wrt typical performance metrics (e.g., additive, min, boolean), and (ii) analyzing their impact in terms of the maximum performance degradation and/or inference error.

Related publications: INFOCOM’20.a, Globecom’20

  • Agile Analytics Enabled by Decentralized Continuous Learning in Coalitions (ARL – DAIS ITA, $147,957, 1/15/2020-9/14/2021)

Develop algorithms with provable performance guarantees for approximate machine learning in resource-constrained edge devices, with focus on optimal design of data reduction techniques (coreset, quantization,random projection, etc) for edge-based learning.

Related publications: ICDCS’20, JSAC’20, Networking’20, FL-ICML’20

News: Machine learning algorithms promise better situational awareness

“Fun” Projects

  • Network Topology Inference under Generalized Forwarding

Study the inference of network routing topology and link performance metrics from end-to-end measurements (a.k.a. network topology tomography) in new networking regimes, such as software-defined networking and network function virtualization, which allow non-tree-based generalized forwarding.

Related publications: ToN’20, ICC’20, INFOCOM’19.a, ICC’19


Past Projects

Study challenges in enabling efficient and reliable distributed analytics in highly dynamic, resource-constrained, and adversarial network environments (e.g., tactical networks). Focus in BPP18 is resource allocation (e.g., service placement, request routing, scheduling) and “universally good coresets” that are much smaller in size than the original dataset but give provable approximation guarantees for a broad range of machine learning models.

Related publications: SMARTCOMP’19,INFOCOM’19.b, INFOCOM’19.c, AI^3’18, ICDCS’18INFOCOM’18.a, Globecom’19

  • Network and Information Sciences (NIS) ITA, BPP13-IPP15 (ARL, $1,500,000, 2013-2016): Network Tomography in Multi-domain Networks

Developed theory and algorithms for unique identification of link/node states from states of end-to-end paths measured between monitors, including: (i) verifiable conditions and efficient network planning (monitor placement, path construction) algorithms to guarantee identifiability of additive link metrics, (ii) novel measure and efficient algorithms to quantify network capability in localizing failures from Boolean path states, (iii) efficient algorithms to design probe allocation for inferring link parameters from stochastic path performance metrics.

Related publications: Performance’17.a, Performance’17.b, TON’17.a, TON’17.c, TON’14, INFOCOM’17, ICDCS’16, INFOCOM’16, MILCOM’15.a, Performance’15.a, SIGMETRICS’15, IMC’14, ICDCS’14, INFOCOM’14, Globecom’13, IMC’13, ICDCS’13

  • Fast Network Configuration in Software-Defined Networks

Study novel optimization problems arising in the selection of paths for new flows and/or adjustment of paths for existing flows that aim at: (i) balancing rule updates across switches, or (ii) minimizing disruption on existing flows.

Related publications: TNSM’18

  • Distributed Machine Learning at the Edge

Study challenges in training machine learning models over a large and distributed dataset based on the architecture of mobile edge computing, with focus on computation/communication tradeoff in “federated learning”.

Related publication: JSAC’19, INFOCOM’18.b

  • Optimal Service Provisioning in Edge Computing

Developed theory and algorithms for: (i) optimal content placement and retention for edge caching, (ii) joint service data/code placement and request scheduling, (iii) optimal service migration in response to user dynamics, (iv) user location privacy in the presence of cyber eavesdroppers, and (v) incentives and mechanism design.

Related publications: JSAC’17, TON’17.b, TPDS’17, MobiHoc’17, ICDCS’17, CCDWN’15, MILCOM’15.b, MILCOM’15.c, Performance’15.b, ICC’15, Networking’15, INFOCOM’15, MILCOM’14.a, MILCOM’14.b, MILCOM’13

  • Online Learning in Large Dynamic Networks

Developed theory and algorithms for: (i) end-host-based learning of shortest path using coupled or decoupled probing, (ii) tracking Markovian time-varying link states using adaptive sampling, and (iii) timing-based tracking of transactions through a distributed transaction processing system.

Related publications: PE’13, INFOCOM’13, INFOCOM’11, MAMA’09

  • Workload Scheduling in Cloud Computing

Developed algorithms and performance analysis for workload scheduling in cloud computing networks with novel features, including (i) stochastic availability of computation resources, (ii) diversity of network scheduling mechanisms, and (iii) requirement of deadlines and commitments.

Related publications: CoNEXT’16, CLOUD’13, CLOUD’12, INFOCOM’12, Allerton’11, SMTPS’11

  • Controlled Mobility in Delay-Tolerant Networks

Developed control policies for dynamically controlling mobile relays (aka data ferries) to provide delay-tolerant communications between partitioned mobile nodes based on partial observations.

Related publications: MILCOM’11, MobiHoc’11, MobiHoc’10, WCNC’10

  • Quality of Information in Sensor Networks

Quantified the impact of imperfect communications (e.g., delays, losses) on the quality of information (QoI) for representative applications in wireless sensor networks, including (i) tracking moving targets and (ii) detecting transient signals.

Related publications: JSAC’13, MILCOM’10, IQ2S’10, INFOCOM’10, MILCOM’08.a, MILCOM’08.c, QoISN’08

  • Timing-based Information Flow Detection

Developed detector and performance guarantee for detecting information flows (a sequence of relayed packet streams) among background traffic and noise based on transmission timestamps, with application to the detection of encrypted stepping-stone attacks.

Related publications: TSP’10, TIT’08.a, TIFS’08, TSP’07, MILCOM’08.b, CISS’08, Asilomar’07, ISIT’07, CISS’07, ASC’06, MILCOM’06.a, ICASSP’06, CISS’06

  • Anonymous Networking among Timing Eavesdroppers

Developed transmission scheduling strategies and fundamental limits for sending anonymous information flows that cannot be detected in both content (via encryption) and timing (via embedding) domains.

Related publications: TIT’13, TIT’08.b, CommMag’08, ITW’11, MILCOM’09, Allerton’09, ICASSP’08, MILCOM’06.b

  • Non-parametric Change Detection in High Dimensional Space

Developed detector and performance analysis for detecting and localizing changes in an unknown distribution in a high dimensional (>1D) space, with application to change detection in 2D random sensor fields.

Related publications: TSP’06, MILCOM’05, ICASSP’05, ASC’04, CISS’04

Powered by WordPress. Designed by WooThemes

Skip to toolbar