Program
Note that times are expressed in 24-hour clock (e.g. 08:00 is 08:00 am, 14:00 is 02:00 pm).
Thursday 19 May
UTC |
CDT |
|
13:00 |
08:00 |
Breakfast (1 hour)
|
14:00 |
09:00 |
Keynote: Accelerating RF Autonomy for Uncertain Environments
John Davies, DARPA
|
15:00 |
10:00 |
Break (20 min)
|
15:20 |
10:20 |
Session 1 (Chair: Dola Saha) RF Analytics |
-
Analysis of Augmentation Methods for RF Fingerprinting under Impaired Channels
(Ceren Comert, Michel Kulhandjian, Omer Melih Gul, Azzedine Touazi, Cliff Ellement, Burak Kantarci, and Claude D'Amours)
-
Online Stream Sampling for Low-Memory On-Device Edge Training for WiFi Sensing
(Steven M Hernandez and Eyuphan Bulut)
-
Deep Learning-based Localization in Limited Data Regimes
(Frost Mitchell, Aniqua Baset, Neal Patwari, Sneha Kumar Kasera, and Aditya Bhaskara)
-
Voice Fingerprinting for Indoor Localization with a Single Microphone Array and Deep Learning
(Shivenkumar Parmar, Xuyu Wang, Chao Yang, and Shiwen Mao)
-
Deep Learning for Spectrum Awareness and Covert Communications via Unintended RF Emanations
(Michael Hegarty, Yalin E. Sagduyu, Tugba Erpek, and Yi Shi)
|
17:00 |
12:00 |
Lunch Break (1 hour)
|
18:00 |
13:00 |
Session 2 (Chair: Xuyu Wang) Spotlight Session |
|
19:20 |
14:20 |
Break (20 min)
|
19:40 |
14:40 |
Session 3 (Chair: Omer Melih Gul) ML Applications and Security
|
-
Can You Hear It? Backdoor Attacks via Ultrasonic Triggers
(Stefanos Koffas, Jing Xu, Mauro Conti, and Stjepan Picek)
-
Undermining Deep Learning Based Channel Estimation via Adversarial Wireless Signal Fabrication
(Tao Hou, Tao Wang, Zhuo Lu, Yao Liu, and Yalin Sagduyu)
-
A Machine Learning-Driven Analysis of Phantom E911 Calls
(Batoul Taki, Yang Hu, Waheed Bajwa, Manoop Talasila, Mukesh Mantan, and Anwar Aftab)
-
Beam Pattern Fingerprinting with Missing Features for Spoofing Attack Detection in Millimeter-Wave Networks
(Ya Jiang, Long Jiao, Liang Zhao, and Kai Zeng)
-
Digital Twin Virtualization with Machine Learning for IoT and Beyond 5G Networks: Research Directions for Security and Optimal Control
(Jithin Jagannath, Keyvan Ramezanpour, and Anu Jagannath)
|
21:20 |
16:20 |
Break (10 min)
|
21:30 |
16:30 |
Panel Discussion on Long Term Prospects for Deep Learning Methods in Wireless Security
|
UTC |
CDT |
|