BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Northeastern University College of Engineering - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Northeastern University College of Engineering
X-ORIGINAL-URL:https://coe.northeastern.edu
X-WR-CALDESC:Events for Northeastern University College of Engineering
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230809T110000
DTEND;TZID=America/New_York:20230809T120000
DTSTAMP:20260505T060023
CREATED:20230802T192340Z
LAST-MODIFIED:20230802T192340Z
UID:37696-1691578800-1691582400@coe.northeastern.edu
SUMMARY:Nasim Soltani PhD Proposal
DESCRIPTION:Title: Deep Learning for the Physical Layer: From Signal Classification to Decoding \nLocation: ISEC 532 \nCommittee Members:\nProf. Kaushik Chowdhury (Advisor)\nProf. Stratis Ioannidis\nProf. Robert Nowak \nAbstract:\nThe growth in wireless spectrum usage has created new physical layer applications and intensified the importance of the existing ones. Physical layer applications ranging from device authentication to signal decoding and interpretation are traditionally handled by deterministic signal processing algorithms. Such algorithms\, while effective\, often require long sequences of data for decision making\, or need approximations of the environmental conditions\, such as noise models\, which may not be always correct in practical conditions. For these reasons\, traditional algorithms are not suitable for making quick decisions on the high rate wireless data with higher noise and interference that is a result of crowded spectrum. To this end\, deep learning-based methods have been explored extensively by the researchers to substitute for the traditional signal processing algorithms for the physical layer. This thesis explores novel methods in this area in the following parts: \nPart I – Signal classification: In this part\, we look at two distinct problems of waveform classification and Radio Frequency (RF) fingerprinting. In the first problem\, we study two use cases of modulation classification on edge devices\, followed by waveform classification and spectrum localization in the Citizen Broadband Radio Service (CBRS) band. In the second problem\, we look at RF fingerprinting that is classifying received signals in terms of subtle impairments that each transmitter leaves in its emitted waveform\, due to its hardware manufacturing imperfections. We propose methods to overcome the wireless channel effect for RF fingerprinting in both stationary transmitters on a large scale dataset (i.e.\, 5k WiFi devices)\, and identical hovering Unmanned Aerial Vehicles (UAVs) that transmit proprietary signals. \nPart II – Signal decoding: In this part\, we introduce our design of a modular machine learning (ML)-aided Orthogonal Frequency Division Multiplexing (OFDM) receiver that improves the bit error rate (BER) of the traditional receiver. We show how a neural network-based demapper block can be used for secure data transmission. Furthermore\, we show how an ML-aided receiver can provide the possibility of reducing communication overhead by obviating the need for the first field of preamble in WiFi signals. We show that reducing the preamble length contributes to higher throughput in WiFi networks\, without BER degradation. \nPart III – As the proposed work\, we will explore the use of active learning for smart sampling of training sets in wireless communications tasks. Active learning reduces the labeling overhead that is often performed using the compute-intensive traditional signal processing algorithms\, by intelligently selecting the most informative training samples to be labeled instead of labeling the whole set. We will also design an ML-life cycle control scheme to monitor and update the performance of an ML-aided 5G receiver\, when deployed in the field with varying environmental conditions.
URL:https://coe.northeastern.edu/event/nasim-soltani-phd-proposal/
LOCATION:532 ISEC\, 360 Huntington Ave\, Boston\, MA\, 02115\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230809T150000
DTEND;TZID=America/New_York:20230809T163000
DTSTAMP:20260505T060023
CREATED:20230731T152624Z
LAST-MODIFIED:20230807T134836Z
UID:37662-1691593200-1691598600@coe.northeastern.edu
SUMMARY:Yuanyuan Li PhD Dissertation Defense
DESCRIPTION:Title: Sub-modularity in Cache Networks \nCommittee Members:\nProf. Stratis Ioannidis\nProf. Lili Su\nProf. Edmund Yeh \nAbstract:\nAs information-based demand surges\, distributed network services\, e.g.\, cache networks\, play an important role to mitigate network traffic. Cache networks are a natural abstraction for many applications\, including information-centric networks\, content delivery networks\, cloud computing\, and edge/wireless IoT. How to allocate resources (routing\, placing items in caches\, flow control\, etc.) in cache networks is a crucial problem\, as resources (storage space\, and bandwidths) are usually limited. Resource allocation in networks has been traditionally approached through classic convex optimization. However\, simple problems becomes combinotorial in cache networks\, which leads to NP-hardness. Enlightened by several works studying cache networks\, we identify a useful property\, submodularity\, which is the key to approximation algorithms solving those NP hard resource allocation problem in cache networks. \nLeveraging submodularity\, we study a cache network\, in which intermediate nodes equipped with caches can serve content requests\, from different angles. \nFirst\, we model this network as a universally stable queuing system\, in which packets carrying identical responses are consolidated before being forwarded downstream. We refer to resulting queues as $\info$ or counting queues\, as consolidated packets carry a counter indicating the packet’s multiplicity. Cache networks comprising such queues are hard to analyze; we propose two approximations: one via $\mminf$ queues\, and one based on $\info$ queues under the assumption of Poisson arrivals. We show that\, in both cases\, the problem of jointly determining (a) content placements and (b) service rates admits a poly-time\, $1-1/e$ approximation algorithm. We also show that our analysis\, with respect to both algorithms and associated guarantees\, extends to (a) counting queues over items\, rather than responses\, as well as to (b) queuing at nodes and edges\, as opposed to just edges. \nSecond\, we refer to the cost reduction enabled by caching as the caching gain\, and the product of the caching gain of a content request and its request rate as \emph{caching gain rate}. We aim to study \emph{fair} content allocation strategies through a utility-driven framework\, where each request achieves a utility of its caching gain rate\, and consider a family of $\alpha$-fair utility functions to capture different degrees of fairness. The resulting problem is an NP-hard problem with a non-decreasing submodular objective function. Submodularity allows us to devise a deterministic allocation strategy with an optimality guarantee factor arbitrarily close to $1-1/e$.  When $0 < \alpha \leq 1$\, we further propose a randomized strategy that attains an improved optimality guarantee\,  $(1-1/e)^{1-\alpha}$\, in expectation. \nThird\, we study a cache network\, and model the problem of jointly optimizing caching and routing decisions with link capacity constraints over an arbitrary network topology. This problem can be formulated as a continuous diminishing-returns(DR) submodular maximization problem under multiple continuous DR-supermodular constraints\, and is NP-hard. We propose a poly-time alternating primal-dual  heuristic algorithm\, in which primal steps produce solutions within $1-\frac{1}{e}$ approximation factor from the optimal. Through extensive experiments\, we demonstrate that our proposed algorithm significantly outperforms competitors. \nForth\, we study a cache network under arbitrary adversarial request arrivals. We propose a distributed online policy based on the online tabular greedy algorithm. Our distributed policy achieves sublinear $(1-\frac{1}{e})$-regret\, also in the case when update costs cannot be neglected. \nFinally\, we propose an {\em experimental design network} paradigm\, wherein learner nodes train possibly different Bayesian linear regression models via consuming data streams generated by data source nodes over a network. We formulate this problem as a social welfare optimization problem in which the global objective is defined as the sum of experimental design objectives of individual learners\, and the decision variables are the data transmission strategies subject to network constraints. We first show that\, assuming Poisson data streams\, the global objective is a continuous DR-submodular function. We then propose a Frank-Wolfe type algorithm that outputs a solution within a $1-1/e$ factor from the optimal. Our algorithm contains a novel gradient estimation component which is carefully designed based on Poisson tail bounds and sampling.
URL:https://coe.northeastern.edu/event/yuanyuan-li-phd-dissertation-defense/
END:VEVENT
END:VCALENDAR