Skip to main content

Showing 1–28 of 28 results for author: Erpek, T

Searching in archive eess. Search in all archives.
.
  1. arXiv:2507.02613  [pdf, ps, other

    cs.NI cs.DC eess.SP

    MULTI-SCOUT: Multistatic Integrated Sensing and Communications in 5G and Beyond for Moving Target Detection, Positioning, and Tracking

    Authors: Yalin E. Sagduyu, Kemal Davaslioglu, Tugba Erpek, Sastry Kompella, Gustave Anderson, Jonathan Ashdown

    Abstract: This paper presents a complete signal-processing chain for multistatic integrated sensing and communications (ISAC) using 5G Positioning Reference Signal (PRS). We consider a distributed architecture in which one gNB transmits a periodic OFDM-PRS waveform while multiple spatially separated receivers exploit the same signal for target detection, parameter estimation and tracking. A coherent cross-a… ▽ More

    Submitted 3 July, 2025; originally announced July 2025.

  2. arXiv:2506.03328  [pdf, ps, other

    cs.NI cs.DC cs.IT eess.SP

    Relay Selection and User Equipment Admission in Resource-Efficient NextG Sidelink Communications

    Authors: Yalin E. Sagduyu, Tugba Erpek, Sastry Kompella, Kemal Davaslioglu

    Abstract: 5G/6G sidelink communications addresses the challenge of connecting outer UEs, which are unable to directly access a base station (gNodeB), through inner UEs that act as relays to connect to the gNodeB. The key performance indicators include the achievable rates, the number of outer UEs that can connect to a gNodeB, and the latency experienced by outer UEs in establishing connections. We consider… ▽ More

    Submitted 3 June, 2025; originally announced June 2025.

  3. arXiv:2505.23706  [pdf, ps, other

    cs.NI cs.AI cs.DC cs.IT eess.SP

    Distributed Federated Learning for Vehicular Network Security: Anomaly Detection Benefits and Multi-Domain Attack Threats

    Authors: Utku Demir, Yalin E. Sagduyu, Tugba Erpek, Hossein Jafari, Sastry Kompella, Mengran Xue

    Abstract: In connected and autonomous vehicles, machine learning for safety message classification has become critical for detecting malicious or anomalous behavior. However, conventional approaches that rely on centralized data collection or purely local training face limitations due to the large scale, high mobility, and heterogeneous data distributions inherent in inter-vehicle networks. To overcome thes… ▽ More

    Submitted 29 May, 2025; originally announced May 2025.

  4. arXiv:2412.21164  [pdf, other

    cs.NI cs.AI cs.CR cs.LG eess.SP

    Adversarial Attack and Defense for LoRa Device Identification and Authentication via Deep Learning

    Authors: Yalin E. Sagduyu, Tugba Erpek

    Abstract: LoRa provides long-range, energy-efficient communications in Internet of Things (IoT) applications that rely on Low-Power Wide-Area Network (LPWAN) capabilities. Despite these merits, concerns persist regarding the security of LoRa networks, especially in situations where device identification and authentication are imperative to secure the reliable access to the LoRa networks. This paper explores… ▽ More

    Submitted 30 December, 2024; originally announced December 2024.

  5. arXiv:2411.10385  [pdf, other

    cs.LG cs.AI cs.DC cs.IT cs.NI eess.SP

    Low-Latency Task-Oriented Communications with Multi-Round, Multi-Task Deep Learning

    Authors: Yalin E. Sagduyu, Tugba Erpek, Aylin Yener, Sennur Ulukus

    Abstract: In this paper, we address task-oriented (or goal-oriented) communications where an encoder at the transmitter learns compressed latent representations of data, which are then transmitted over a wireless channel. At the receiver, a decoder performs a machine learning task, specifically for classifying the received signals. The deep neural networks corresponding to the encoder-decoder pair are joint… ▽ More

    Submitted 15 November, 2024; originally announced November 2024.

  6. arXiv:2410.08999  [pdf, other

    eess.SP

    I-SCOUT: Integrated Sensing and Communications to Uncover Moving Targets in NextG Networks

    Authors: Utku Demir, Kemal Davaslioglu, Yalin E. Sagduyu, Tugba Erpek, Gustave Anderson, Sastry Kompella

    Abstract: Integrated Sensing and Communication (ISAC) represents a transformative approach within 5G and beyond, aiming to merge wireless communication and sensing functionalities into a unified network infrastructure. This integration offers enhanced spectrum efficiency, real-time situational awareness, cost and energy reductions, and improved operational performance. ISAC provides simultaneous communicati… ▽ More

    Submitted 11 October, 2024; originally announced October 2024.

    Comments: Accepted for publication at the MILCOM'24 conference

  7. arXiv:2401.01531  [pdf, other

    cs.NI cs.CR cs.IT cs.LG eess.SP

    Will 6G be Semantic Communications? Opportunities and Challenges from Task Oriented and Secure Communications to Integrated Sensing

    Authors: Yalin E. Sagduyu, Tugba Erpek, Aylin Yener, Sennur Ulukus

    Abstract: This paper explores opportunities and challenges of task (goal)-oriented and semantic communications for next-generation (NextG) communication networks through the integration of multi-task learning. This approach employs deep neural networks representing a dedicated encoder at the transmitter and multiple task-specific decoders at the receiver, collectively trained to handle diverse tasks includi… ▽ More

    Submitted 2 January, 2024; originally announced January 2024.

  8. arXiv:2312.16715  [pdf, other

    cs.CR cs.AI cs.LG cs.NI eess.SP

    Adversarial Attacks on LoRa Device Identification and Rogue Signal Detection with Deep Learning

    Authors: Yalin E. Sagduyu, Tugba Erpek

    Abstract: Low-Power Wide-Area Network (LPWAN) technologies, such as LoRa, have gained significant attention for their ability to enable long-range, low-power communication for Internet of Things (IoT) applications. However, the security of LoRa networks remains a major concern, particularly in scenarios where device identification and classification of legitimate and spoofed signals are crucial. This paper… ▽ More

    Submitted 27 December, 2023; originally announced December 2023.

  9. arXiv:2312.13931  [pdf, other

    cs.NI cs.AI cs.IT cs.LG eess.SP

    Joint Sensing and Task-Oriented Communications with Image and Wireless Data Modalities for Dynamic Spectrum Access

    Authors: Yalin E. Sagduyu, Tugba Erpek, Aylin Yener, Sennur Ulukus

    Abstract: This paper introduces a deep learning approach to dynamic spectrum access, leveraging the synergy of multi-modal image and spectrum data for the identification of potential transmitters. We consider an edge device equipped with a camera that is taking images of potential objects such as vehicles that may harbor transmitters. Recognizing the computational constraints and trust issues associated wit… ▽ More

    Submitted 21 December, 2023; originally announced December 2023.

  10. Learning-Based UAV Path Planning for Data Collection with Integrated Collision Avoidance

    Authors: Xueyuan Wang, M. Cenk Gursoy, Tugba Erpek, Yalin E. Sagduyu

    Abstract: Unmanned aerial vehicles (UAVs) are expected to be an integral part of wireless networks, and determining collision-free trajectory in multi-UAV non-cooperative scenarios while collecting data from distributed Internet of Things (IoT) nodes is a challenging task. In this paper, we consider a path planning optimization problem to maximize the collected data from multiple IoT nodes under realistic c… ▽ More

    Submitted 11 December, 2023; originally announced December 2023.

    Comments: The final version of this paper has been accepted in IEEE Internet of Things Journal

    Journal ref: Volume: 9, Issue: 17, 01 September 2022

  11. arXiv:2311.05017  [pdf, other

    cs.NI cs.AI cs.IT cs.LG eess.SP

    Joint Sensing and Semantic Communications with Multi-Task Deep Learning

    Authors: Yalin E. Sagduyu, Tugba Erpek, Aylin Yener, Sennur Ulukus

    Abstract: This paper explores the integration of deep learning techniques for joint sensing and communications, with an extension to semantic communications. The integrated system comprises a transmitter and receiver operating over a wireless channel, subject to noise and fading. The transmitter employs a deep neural network (DNN), namely an encoder, for joint operations of source coding, channel coding, an… ▽ More

    Submitted 21 October, 2024; v1 submitted 8 November, 2023; originally announced November 2023.

  12. arXiv:2308.06884  [pdf, other

    cs.NI cs.IT cs.LG eess.SP

    Multi-Receiver Task-Oriented Communications via Multi-Task Deep Learning

    Authors: Yalin E. Sagduyu, Tugba Erpek, Aylin Yener, Sennur Ulukus

    Abstract: This paper studies task-oriented, otherwise known as goal-oriented, communications, in a setting where a transmitter communicates with multiple receivers, each with its own task to complete on a dataset, e.g., images, available at the transmitter. A multi-task deep learning approach that involves training a common encoder at the transmitter and individual decoders at the receivers is presented for… ▽ More

    Submitted 13 August, 2023; originally announced August 2023.

  13. arXiv:2212.11205  [pdf, other

    cs.CR cs.IT cs.LG cs.NI eess.SP

    Vulnerabilities of Deep Learning-Driven Semantic Communications to Backdoor (Trojan) Attacks

    Authors: Yalin E. Sagduyu, Tugba Erpek, Sennur Ulukus, Aylin Yener

    Abstract: This paper highlights vulnerabilities of deep learning-driven semantic communications to backdoor (Trojan) attacks. Semantic communications aims to convey a desired meaning while transferring information from a transmitter to its receiver. An encoder-decoder pair that is represented by two deep neural networks (DNNs) as part of an autoencoder is trained to reconstruct signals such as images at the… ▽ More

    Submitted 21 December, 2022; originally announced December 2022.

  14. arXiv:2212.10438  [pdf, other

    cs.CR cs.IT cs.LG cs.NI eess.SP

    Is Semantic Communications Secure? A Tale of Multi-Domain Adversarial Attacks

    Authors: Yalin E. Sagduyu, Tugba Erpek, Sennur Ulukus, Aylin Yener

    Abstract: Semantic communications seeks to transfer information from a source while conveying a desired meaning to its destination. We model the transmitter-receiver functionalities as an autoencoder followed by a task classifier that evaluates the meaning of the information conveyed to the receiver. The autoencoder consists of an encoder at the transmitter to jointly model source coding, channel coding, an… ▽ More

    Submitted 20 December, 2022; originally announced December 2022.

  15. arXiv:2201.01388  [pdf, other

    cs.IT cs.AI cs.LG cs.NI eess.SP

    End-to-End Autoencoder Communications with Optimized Interference Suppression

    Authors: Kemal Davaslioglu, Tugba Erpek, Yalin E. Sagduyu

    Abstract: An end-to-end communications system based on Orthogonal Frequency Division Multiplexing (OFDM) is modeled as an autoencoder (AE) for which the transmitter (coding and modulation) and receiver (demodulation and decoding) are represented as deep neural networks (DNNs) of the encoder and decoder, respectively. This AE communications approach is shown to outperform conventional communications in terms… ▽ More

    Submitted 29 December, 2021; originally announced January 2022.

  16. arXiv:2112.11414  [pdf, ps, other

    eess.SP cs.LG cs.NI stat.ML

    Covert Communications via Adversarial Machine Learning and Reconfigurable Intelligent Surfaces

    Authors: Brian Kim, Tugba Erpek, Yalin E. Sagduyu, Sennur Ulukus

    Abstract: By moving from massive antennas to antenna surfaces for software-defined wireless systems, the reconfigurable intelligent surfaces (RISs) rely on arrays of unit cells to control the scattering and reflection profiles of signals, mitigating the propagation loss and multipath attenuation, and thereby improving the coverage and spectral efficiency. In this paper, covert communication is considered in… ▽ More

    Submitted 21 December, 2021; originally announced December 2021.

  17. arXiv:2109.08139  [pdf, ps, other

    eess.SP cs.LG cs.NI stat.ML

    Adversarial Attacks against Deep Learning Based Power Control in Wireless Communications

    Authors: Brian Kim, Yi Shi, Yalin E. Sagduyu, Tugba Erpek, Sennur Ulukus

    Abstract: We consider adversarial machine learning based attacks on power allocation where the base station (BS) allocates its transmit power to multiple orthogonal subcarriers by using a deep neural network (DNN) to serve multiple user equipments (UEs). The DNN that corresponds to a regression model is trained with channel gains as the input and returns transmit powers as the output. While the BS allocates… ▽ More

    Submitted 12 October, 2021; v1 submitted 16 September, 2021; originally announced September 2021.

  18. arXiv:2103.13989  [pdf, ps, other

    eess.SP cs.LG cs.NI stat.ML

    Adversarial Attacks on Deep Learning Based mmWave Beam Prediction in 5G and Beyond

    Authors: Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Sennur Ulukus

    Abstract: Deep learning provides powerful means to learn from spectrum data and solve complex tasks in 5G and beyond such as beam selection for initial access (IA) in mmWave communications. To establish the IA between the base station (e.g., gNodeB) and user equipment (UE) for directional transmissions, a deep neural network (DNN) can predict the beam that is best slanted to each UE by using the received si… ▽ More

    Submitted 25 March, 2021; originally announced March 2021.

  19. arXiv:2101.01847  [pdf, other

    cs.NI cs.LG eess.SP

    Deep Learning for Fast and Reliable Initial Access in AI-Driven 6G mmWave Networks

    Authors: Tarun S. Cousik, Vijay K. Shah, Tugba Erpek, Yalin E. Sagduyu, Jeffrey H. Reed

    Abstract: We present DeepIA, a deep neural network (DNN) framework for enabling fast and reliable initial access for AI-driven beyond 5G and 6G millimeter (mmWave) networks. DeepIA reduces the beam sweep time compared to a conventional exhaustive search-based IA process by utilizing only a subset of the available beams. DeepIA maps received signal strengths (RSSs) obtained from a subset of beams to the beam… ▽ More

    Submitted 5 January, 2021; originally announced January 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:2006.12653

  20. arXiv:2012.02160  [pdf, ps, other

    eess.SP cs.LG cs.NI stat.ML

    Channel Effects on Surrogate Models of Adversarial Attacks against Wireless Signal Classifiers

    Authors: Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Sennur Ulukus

    Abstract: We consider a wireless communication system that consists of a background emitter, a transmitter, and an adversary. The transmitter is equipped with a deep neural network (DNN) classifier for detecting the ongoing transmissions from the background emitter and transmits a signal if the spectrum is idle. Concurrently, the adversary trains its own DNN classifier as the surrogate model by observing th… ▽ More

    Submitted 8 March, 2021; v1 submitted 3 December, 2020; originally announced December 2020.

  21. arXiv:2007.16204  [pdf, ps, other

    eess.SP cs.LG cs.NI stat.ML

    Adversarial Attacks with Multiple Antennas Against Deep Learning-Based Modulation Classifiers

    Authors: Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Sennur Ulukus

    Abstract: We consider a wireless communication system, where a transmitter sends signals to a receiver with different modulation types while the receiver classifies the modulation types of the received signals using its deep learning-based classifier. Concurrently, an adversary transmits adversarial perturbations using its multiple antennas to fool the classifier into misclassifying the received signals. Fr… ▽ More

    Submitted 31 July, 2020; originally announced July 2020.

  22. arXiv:2006.12653  [pdf, other

    eess.SP cs.LG cs.NI

    Fast Initial Access with Deep Learning for Beam Prediction in 5G mmWave Networks

    Authors: Tarun S. Cousik, Vijay K. Shah, Jeffrey H. Reed, Tugba Erpek, Yalin E. Sagduyu

    Abstract: This paper presents DeepIA, a deep learning solution for faster and more accurate initial access (IA) in 5G millimeter wave (mmWave) networks when compared to conventional IA. By utilizing a subset of beams in the IA process, DeepIA removes the need for an exhaustive beam search thereby reducing the beam sweep time in IA. A deep neural network (DNN) is trained to learn the complex mapping from the… ▽ More

    Submitted 22 June, 2020; originally announced June 2020.

  23. arXiv:2005.07675  [pdf, ps, other

    eess.SP cs.LG cs.NI stat.ML

    How to Make 5G Communications "Invisible": Adversarial Machine Learning for Wireless Privacy

    Authors: Brian Kim, Yalin E. Sagduyu, Kemal Davaslioglu, Tugba Erpek, Sennur Ulukus

    Abstract: We consider the problem of hiding wireless communications from an eavesdropper that employs a deep learning (DL) classifier to detect whether any transmission of interest is present or not. There exists one transmitter that transmits to its receiver in the presence of an eavesdropper, while a cooperative jammer (CJ) transmits carefully crafted adversarial perturbations over the air to fool the eav… ▽ More

    Submitted 15 May, 2020; originally announced May 2020.

  24. arXiv:2005.05321  [pdf, ps, other

    eess.SP cs.LG cs.NI stat.ML

    Channel-Aware Adversarial Attacks Against Deep Learning-Based Wireless Signal Classifiers

    Authors: Brian Kim, Yalin E. Sagduyu, Kemal Davaslioglu, Tugba Erpek, Sennur Ulukus

    Abstract: This paper presents channel-aware adversarial attacks against deep learning-based wireless signal classifiers. There is a transmitter that transmits signals with different modulation types. A deep neural network is used at each receiver to classify its over-the-air received signals to modulation types. In the meantime, an adversary transmits an adversarial perturbation (subject to a power budget)… ▽ More

    Submitted 20 December, 2021; v1 submitted 11 May, 2020; originally announced May 2020.

    Comments: Submitted for publication. arXiv admin note: substantial text overlap with arXiv:2002.02400

  25. arXiv:2002.02400  [pdf, ps, other

    eess.SP cs.LG cs.NI stat.ML

    Over-the-Air Adversarial Attacks on Deep Learning Based Modulation Classifier over Wireless Channels

    Authors: Brian Kim, Yalin E. Sagduyu, Kemal Davaslioglu, Tugba Erpek, Sennur Ulukus

    Abstract: We consider a wireless communication system that consists of a transmitter, a receiver, and an adversary. The transmitter transmits signals with different modulation types, while the receiver classifies its received signals to modulation types using a deep learning-based classifier. In the meantime, the adversary makes over-the-air transmissions that are received as superimposed with the transmitt… ▽ More

    Submitted 13 February, 2020; v1 submitted 5 February, 2020; originally announced February 2020.

  26. arXiv:1911.00500  [pdf, other

    cs.NI cs.LG eess.SP

    Adversarial Deep Learning for Over-the-Air Spectrum Poisoning Attacks

    Authors: Yalin E. Sagduyu, Yi Shi, Tugba Erpek

    Abstract: An adversarial deep learning approach is presented to launch over-the-air spectrum poisoning attacks. A transmitter applies deep learning on its spectrum sensing results to predict idle time slots for data transmission. In the meantime, an adversary learns the transmitter's behavior (exploratory attack) by building another deep neural network to predict when transmissions will succeed. The adversa… ▽ More

    Submitted 31 October, 2019; originally announced November 2019.

    Comments: Accepted to IEEE Transactions on Mobile Computing. arXiv admin note: text overlap with arXiv:1901.09247

  27. arXiv:1910.13315  [pdf, other

    cs.NI cs.CR cs.LG eess.SP

    DeepWiFi: Cognitive WiFi with Deep Learning

    Authors: Kemal Davaslioglu, Sohraab Soltani, Tugba Erpek, Yalin E. Sagduyu

    Abstract: We present the DeepWiFi protocol, which hardens the baseline WiFi (IEEE 802.11ac) with deep learning and sustains high throughput by mitigating out-of-network interference. DeepWiFi is interoperable with baseline WiFi and builds upon the existing WiFi's PHY transceiver chain without changing the MAC frame format. Users run DeepWiFi for i) RF front end processing; ii) spectrum sensing and signal cl… ▽ More

    Submitted 29 October, 2019; originally announced October 2019.

    Comments: Accepted to IEEE Transactions on Mobile Computing, 17 pages (including the Appendix), 23 figures, and 7 tables

  28. arXiv:1910.05765  [pdf, other

    cs.NI cs.LG eess.SP

    Real-Time and Embedded Deep Learning on FPGA for RF Signal Classification

    Authors: Sohraab Soltani, Yalin E. Sagduyu, Raqibul Hasan, Kemal Davaslioglu, Hongmei Deng, Tugba Erpek

    Abstract: We designed and implemented a deep learning based RF signal classifier on the Field Programmable Gate Array (FPGA) of an embedded software-defined radio platform, DeepRadio, that classifies the signals received through the RF front end to different modulation types in real time and with low power. This classifier implementation successfully captures complex characteristics of wireless signals to s… ▽ More

    Submitted 13 October, 2019; originally announced October 2019.