Program
Note that times are expressed in 24-hour clock (e.g. 08:00 is 08:00 am, 14:00 is 02:00 pm).
Thursday 19 May
    
        | UTC | CDT |  | 
    
        | 13:00 | 08:00 | Breakfast (1 hour) | 
    
        | 14:00 | 09:00 | Keynote: Accelerating RF Autonomy for Uncertain Environments John Davies, DARPA
 | 
    
        | 15:00 | 10:00 | Break (20 min) | 
    
        | 15:20 | 10:20 | Session 1 (Chair: Dola Saha) RF Analytics
 | 
    
        | 
            
                
Analysis of Augmentation Methods for RF Fingerprinting under Impaired Channels
    (Ceren Comert, Michel Kulhandjian, Omer Melih Gul, Azzedine Touazi, Cliff Ellement, Burak Kantarci, and Claude D'Amours)
            	
Online Stream Sampling for Low-Memory On-Device Edge Training for WiFi Sensing
    (Steven M Hernandez and Eyuphan Bulut)
                
Deep Learning-based Localization in Limited Data Regimes
    (Frost Mitchell, Aniqua Baset, Neal Patwari, Sneha Kumar Kasera, and Aditya Bhaskara)
            	
Voice Fingerprinting for Indoor Localization with a Single Microphone Array and Deep Learning
    (Shivenkumar Parmar, Xuyu Wang, Chao Yang, and Shiwen Mao)
            	
Deep Learning for Spectrum Awareness and Covert Communications via Unintended RF Emanations
    (Michael Hegarty, Yalin E. Sagduyu, Tugba Erpek, and Yi Shi)
 | 
    
        | 17:00 | 12:00 | Lunch Break (1 hour) | 
    
        | 18:00 | 13:00 | Session 2 (Chair: Xuyu Wang) Spotlight Session
 | 
    
        |  | 
    
        | 19:20 | 14:20 | Break (20 min) | 
    
        | 19:40 | 14:40 | Session 3 (Chair: Omer Melih Gul) ML Applications and Security
 | 
    
        | 
        		
        			
Can You Hear It? Backdoor Attacks via Ultrasonic Triggers
    (Stefanos Koffas, Jing Xu, Mauro Conti, and Stjepan Picek)
        			
Undermining Deep Learning Based Channel Estimation via Adversarial Wireless Signal Fabrication
    (Tao Hou, Tao Wang, Zhuo Lu, Yao Liu, and Yalin Sagduyu)
        			
A Machine Learning-Driven Analysis of Phantom E911 Calls
    (Batoul Taki, Yang Hu, Waheed Bajwa, Manoop Talasila, Mukesh Mantan, and Anwar Aftab)
        			
Beam Pattern Fingerprinting with Missing Features for Spoofing Attack Detection in Millimeter-Wave Networks
    (Ya Jiang, Long Jiao, Liang Zhao, and Kai Zeng)
        			
Digital Twin Virtualization with Machine Learning for IoT and Beyond 5G Networks: Research Directions for Security and Optimal Control
    (Jithin Jagannath, Keyvan Ramezanpour, and Anu Jagannath)
 | 
    
        | 21:20 | 16:20 | Break (10 min) | 
    
        | 21:30 | 16:30 | Panel Discussion on Long Term Prospects for Deep Learning Methods in Wireless Security | 
	
	    | UTC | CDT |  |