Zum Hauptinhalt springen

Showing 1–50 of 58 results for author: Restuccia, F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.15561  [pdf, other

    cs.AR cs.AI

    CGRA4ML: A Framework to Implement Modern Neural Networks for Scientific Edge Computing

    Authors: G Abarajithan, Zhenghua Ma, Zepeng Li, Shrideep Koparkar, Ravidu Munasinghe, Francesco Restuccia, Ryan Kastner

    Abstract: Scientific edge computing increasingly relies on hardware-accelerated neural networks to implement complex, near-sensor processing at extremely high throughputs and low latencies. Existing frameworks like HLS4ML are effective for smaller models, but struggle with larger, modern neural networks due to their requirement of spatially implementing the neural network layers and storing all weights in o… ▽ More

    Submitted 28 August, 2024; v1 submitted 28 August, 2024; originally announced August 2024.

  2. arXiv:2408.00193  [pdf, other

    cs.CR cs.AI

    Resilience and Security of Deep Neural Networks Against Intentional and Unintentional Perturbations: Survey and Research Challenges

    Authors: Sazzad Sayyed, Milin Zhang, Shahriar Rifat, Ananthram Swami, Michael De Lucia, Francesco Restuccia

    Abstract: In order to deploy deep neural networks (DNNs) in high-stakes scenarios, it is imperative that DNNs provide inference robust to external perturbations - both intentional and unintentional. Although the resilience of DNNs to intentional and unintentional perturbations has been widely investigated, a unified vision of these inherently intertwined problem domains is still missing. In this work, we fi… ▽ More

    Submitted 2 August, 2024; v1 submitted 31 July, 2024; originally announced August 2024.

  3. arXiv:2403.00942  [pdf, other

    cs.LG cs.AI cs.CR

    Resilience of Entropy Model in Distributed Neural Networks

    Authors: Milin Zhang, Mohammad Abdi, Shahriar Rifat, Francesco Restuccia

    Abstract: Distributed deep neural networks (DNNs) have emerged as a key technique to reduce communication overhead without sacrificing performance in edge computing systems. Recently, entropy coding has been introduced to further reduce the communication overhead. The key idea is to train the distributed DNN jointly with an entropy model, which is used as side information during inference time to adaptively… ▽ More

    Submitted 11 July, 2024; v1 submitted 1 March, 2024; originally announced March 2024.

    Comments: accepted at ECCV 2024

  4. arXiv:2402.10021  [pdf, other

    cs.CV cs.NI

    SAWEC: Sensing-Assisted Wireless Edge Computing

    Authors: Khandaker Foysal Haque, Francesca Meneghello, Md. Ebtidaul Karim, Francesco Restuccia

    Abstract: Emerging mobile virtual reality (VR) systems will require to continuously perform complex computer vision tasks on ultra-high-resolution video frames through the execution of deep neural networks (DNNs)-based algorithms. Since state-of-the-art DNNs require computational power that is excessive for mobile devices, techniques based on wireless edge computing (WEC) have been recently proposed. Howeve… ▽ More

    Submitted 15 April, 2024; v1 submitted 15 February, 2024; originally announced February 2024.

    Comments: Submitted to ACM for possible publication

  5. arXiv:2402.03465  [pdf, other

    cs.NI eess.SP

    Stitching the Spectrum: Semantic Spectrum Segmentation with Wideband Signal Stitching

    Authors: Daniel Uvaydov, Milin Zhang, Clifton Paul Robinson, Salvatore D'Oro, Tommaso Melodia, Francesco Restuccia

    Abstract: Spectrum has become an extremely scarce and congested resource. As a consequence, spectrum sensing enables the coexistence of different wireless technologies in shared spectrum bands. Most existing work requires spectrograms to classify signals. Ultimately, this implies that images need to be continuously created from I/Q samples, thus creating unacceptable latency for real-time operations. In add… ▽ More

    Submitted 7 February, 2024; v1 submitted 5 February, 2024; originally announced February 2024.

  6. TOP: Towards Open & Predictable Heterogeneous SoCs

    Authors: Luca Valente, Francesco Restuccia, Davide Rossi, Ryan Kastner, Luca Benini

    Abstract: Ensuring predictability in modern real-time Systems-on-Chip (SoCs) is an increasingly critical concern for many application domains such as automotive, robotics, and industrial automation. An effective approach involves the modeling and development of hardware components, such as interconnects and shared memory resources, to evaluate or enforce their deterministic behavior. Unfortunately, these IP… ▽ More

    Submitted 7 June, 2024; v1 submitted 28 January, 2024; originally announced January 2024.

  7. arXiv:2311.09662  [pdf, other

    cs.AR

    AXI-REALM: A Lightweight and Modular Interconnect Extension for Traffic Regulation and Monitoring of Heterogeneous Real-Time SoCs

    Authors: Thomas Benz, Alessandro Ottaviano, Robert Balas, Angelo Garofalo, Francesco Restuccia, Alessandro Biondi, Luca Benini

    Abstract: The increasing demand for heterogeneous functionality in the automotive industry and the evolution of chip manufacturing processes have led to the transition from federated to integrated critical real-time embedded systems (CRTESs). This leads to higher integration challenges of conventional timing predictability techniques due to access contention on shared resources, which can be resolved by pro… ▽ More

    Submitted 16 November, 2023; originally announced November 2023.

    Comments: 6 pages, 6 figures, accepted as a regular paper at DATE24

  8. arXiv:2310.08656  [pdf, other

    cs.NI cs.LG eess.SP

    SplitBeam: Effective and Efficient Beamforming in Wi-Fi Networks Through Split Computing

    Authors: Niloofar Bahadori, Yoshitomo Matsubara, Marco Levorato, Francesco Restuccia

    Abstract: Modern IEEE 802.11 (Wi-Fi) networks extensively rely on multiple-input multiple-output (MIMO) to significantly improve throughput. To correctly beamform MIMO transmissions, the access point needs to frequently acquire a beamforming matrix (BM) from each connected station. However, the size of the matrix grows with the number of antennas and subcarriers, resulting in an increasing amount of airtime… ▽ More

    Submitted 12 October, 2023; originally announced October 2023.

    Comments: Presented at the 43rd IEEE International Conference on Distributed Computing Systems (ICDCS 2023)

  9. arXiv:2310.01259  [pdf, other

    cs.CV cs.AI cs.LG

    Faster and Accurate Neural Networks with Semantic Inference

    Authors: Sazzad Sayyed, Jonathan Ashdown, Francesco Restuccia

    Abstract: Deep neural networks (DNN) usually come with a significant computational burden. While approaches such as structured pruning and mobile-specific DNNs have been proposed, they incur drastic accuracy loss. In this paper we leverage the intrinsic redundancy in latent representations to reduce the computational load with limited loss in performance. We show that semantically similar inputs share many… ▽ More

    Submitted 3 October, 2023; v1 submitted 2 October, 2023; originally announced October 2023.

    Comments: 14 pages, 6 figures, conference format

  10. arXiv:2309.17401  [pdf, other

    cs.LG cs.AI

    Adversarial Machine Learning in Latent Representations of Neural Networks

    Authors: Milin Zhang, Mohammad Abdi, Francesco Restuccia

    Abstract: Distributed deep neural networks (DNNs) have been shown to reduce the computational burden of mobile devices and decrease the end-to-end inference latency in edge computing scenarios. While distributed DNNs have been studied, to the best of our knowledge the resilience of distributed DNNs to adversarial action still remains an open problem. In this paper, we fill the existing research gap by rigor… ▽ More

    Submitted 30 January, 2024; v1 submitted 29 September, 2023; originally announced September 2023.

  11. Wi-BFI: Extracting the IEEE 802.11 Beamforming Feedback Information from Commercial Wi-Fi Devices

    Authors: Khandaker Foysal Haque, Francesca Meneghello, Francesco Restuccia

    Abstract: Recently, researchers have shown that the beamforming feedback angles (BFAs) used for Wi-Fi multiple-input multiple-output (MIMO) operations can be effectively leveraged as a proxy of the channel frequency response (CFR) for different purposes. Examples are passive human activity recognition and device fingerprinting. However, even though the BFAs report frames are sent in clear text, there is not… ▽ More

    Submitted 12 September, 2023; v1 submitted 8 September, 2023; originally announced September 2023.

    Comments: To be presented at ACM WiNTECH, Madrid, Spain, October 6, 2023

    Journal ref: WiNTECH 2023: Proceedings of the 17th ACM Workshop on Wireless Network Testbeds, Experimental evaluation & Characterization

  12. SiMWiSense: Simultaneous Multi-Subject Activity Classification Through Wi-Fi Signals

    Authors: Khandaker Foysal Haque, Milin Zhang, Francesco Restuccia

    Abstract: Recent advances in Wi-Fi sensing have ushered in a plethora of pervasive applications in home surveillance, remote healthcare, road safety, and home entertainment, among others. Most of the existing works are limited to the activity classification of a single human subject at a given time. Conversely, a more realistic scenario is to achieve simultaneous, multi-subject activity classification. The… ▽ More

    Submitted 31 March, 2023; originally announced April 2023.

    Comments: This work has been accepted for publication in IEEE WoWMoM 2023

  13. arXiv:2303.09687  [pdf, other

    cs.NI eess.SP

    BeamSense: Rethinking Wireless Sensing with MU-MIMO Wi-Fi Beamforming Feedback

    Authors: Khandaker Foysal Haque, Milin Zhang, Francesca Meneghello, Francesco Restuccia

    Abstract: In this paper, we propose BeamSense, a completely novel approach to implement standard-compliant Wi-Fi sensing applications. Wi-Fi sensing enables game-changing applications in remote healthcare, home entertainment, and home surveillance, among others. However, existing work leverages the manual extraction of channel state information (CSI) from Wi-Fi chips to classify activities, which is not sup… ▽ More

    Submitted 16 March, 2023; originally announced March 2023.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  14. arXiv:2302.00992  [pdf, other

    cs.NI cs.LG eess.SP

    Exposing the CSI: A Systematic Investigation of CSI-based Wi-Fi Sensing Capabilities and Limitations

    Authors: Marco Cominelli, Francesco Gringoli, Francesco Restuccia

    Abstract: Thanks to the ubiquitous deployment of Wi-Fi hotspots, channel state information (CSI)-based Wi-Fi sensing can unleash game-changing applications in many fields, such as healthcare, security, and entertainment. However, despite one decade of active research on Wi-Fi sensing, most existing work only considers legacy IEEE 802.11n devices, often in particular and strictly-controlled environments. Wor… ▽ More

    Submitted 2 February, 2023; originally announced February 2023.

    Comments: 10 pages, 13 figures, accepted for publication in Proceedings of IEEE PerCom 2023

  15. arXiv:2301.06363  [pdf, other

    cs.NI cs.CV cs.LG

    A$^2$-UAV: Application-Aware Content and Network Optimization of Edge-Assisted UAV Systems

    Authors: Andrea Coletta, Flavio Giorgi, Gaia Maselli, Matteo Prata, Domenicomichele Silvestri, Jonathan Ashdown, Francesco Restuccia

    Abstract: To perform advanced surveillance, Unmanned Aerial Vehicles (UAVs) require the execution of edge-assisted computer vision (CV) tasks. In multi-hop UAV networks, the successful transmission of these tasks to the edge is severely challenged due to severe bandwidth constraints. For this reason, we propose a novel A$^2$-UAV framework to optimize the number of correctly executed tasks at the edge. In st… ▽ More

    Submitted 24 July, 2023; v1 submitted 16 January, 2023; originally announced January 2023.

    Comments: Accepted to INFOCOM 2023

    Report number: SR-10

  16. Toward Integrated Sensing and Communications in IEEE 802.11bf Wi-Fi Networks

    Authors: Francesca Meneghello, Cheng Chen, Carlos Cordeiro, Francesco Restuccia

    Abstract: As Wi-Fi becomes ubiquitous in public and private spaces, it becomes natural to leverage its intrinsic ability to sense the surrounding environment to implement groundbreaking wireless sensing applications such as human presence detection, activity recognition, and object tracking. For this reason, the IEEE 802.11bf Task Group is defining the appropriate modifications to existing Wi-Fi standards t… ▽ More

    Submitted 25 April, 2023; v1 submitted 28 December, 2022; originally announced December 2022.

    Comments: Accepted for publication in IEEE Communications Magazine

    Journal ref: IEEE Communications Magazine 2023

  17. SEM-O-RAN: Semantic and Flexible O-RAN Slicing for NextG Edge-Assisted Mobile Systems

    Authors: Corrado Puligheddu, Jonathan Ashdown, Carla Fabiana Chiasserini, Francesco Restuccia

    Abstract: 5G and beyond cellular networks (NextG) will support the continuous execution of resource-expensive edge-assisted deep learning (DL) tasks. To this end, Radio Access Network (RAN) resources will need to be carefully "sliced" to satisfy heterogeneous application requirements while minimizing RAN usage. Existing slicing frameworks treat each DL task as equal and inflexibly define the resources to as… ▽ More

    Submitted 22 December, 2022; originally announced December 2022.

    Comments: Accepted in IEEE INFOCOM 2023

  18. arXiv:2208.13690  [pdf, other

    eess.SP cs.IT cs.NI

    Terahertz Communications Can Work in Rain and Snow: Impact of Adverse Weather Conditions on Channels at 140 GHz

    Authors: Priyangshu Sen, Jacob Hall, Michele Polese, Vitaly Petrov, Duschia Bodet, Francesco Restuccia, Tommaso Melodia, Josep M. Jornet

    Abstract: Next-generation wireless networks will leverage the spectrum above 100 GHz to enable ultra-high data rate communications over multi-GHz-wide bandwidths. The propagation environment at such high frequencies, however, introduces challenges throughout the whole protocol stack design, from physical layer signal processing to application design. Therefore, it is fundamental to develop a holistic unders… ▽ More

    Submitted 29 August, 2022; originally announced August 2022.

    Comments: P. Sen, J. Hall, M. Polese, V. Petrov, D. Bodet, F. Restuccia, T. Melodia, J. M. Jornet. 2022. Terahertz Communications Can Work in Rain and Snow: Impact of Adverse Weather Conditions on Channels at 140 GHz. In 6th ACM Workshop on Millimeter-Wave and Terahertz Networks and Sensing Systems (mmNets'22), October 17, 2022, Sydney, NSW, Australia. ACM, New York, NY, USA, 6 pages

  19. Accurate and Efficient Modeling of 802.15.4 Unslotted CSMA/CA through Event Chains Computation

    Authors: Domenico De Guglielmo, Francesco Restuccia, Giuseppe Anastasi, Marco Conti, Sajal K. Das

    Abstract: Many analytical models have been proposed for evaluating the performance of event-driven 802.15.4 Wireless Sensor Networks (WSNs), in Non-Beacon Enabled (NBE) mode. However, existing models do not provide accurate analysis of large-scale WSNs, due to tractability issues and/or simplifying assumptions. In this paper, we propose a new approach called Event Chains Computation (ECC) to model the unslo… ▽ More

    Submitted 30 May, 2022; originally announced May 2022.

    Journal ref: In IEEE Transactions on Mobile Computing, vol. 15, no. 12, pp. 2954-2968, 1 Dec. 2016

  20. DeepCSI: Rethinking Wi-Fi Radio Fingerprinting Through MU-MIMO CSI Feedback Deep Learning

    Authors: Francesca Meneghello, Michele Rossi, Francesco Restuccia

    Abstract: We present DeepCSI, a novel approach to Wi-Fi radio fingerprinting (RFP) which leverages standard-compliant beamforming feedback matrices to authenticate MU-MIMO Wi-Fi devices on the move. By capturing unique imperfections in off-the-shelf radio circuitry, RFP techniques can identify wireless devices directly at the physical layer, allowing low-latency low-energy cryptography-free authentication.… ▽ More

    Submitted 15 April, 2022; originally announced April 2022.

    Comments: To be presented at the 42nd IEEE International Conference on Distributed Computing Systems (ICDCS), Bologna, Italy, July 10-13, 2022

    Journal ref: IEEE 42nd International Conference on Distributed Computing Systems (ICDCS) 2022

  21. arXiv:2201.06326  [pdf, other

    cs.NI

    ChARM: NextG Spectrum Sharing Through Data-Driven Real-Time O-RAN Dynamic Control

    Authors: Luca Baldesi, Francesco Restuccia, Tommaso Melodia

    Abstract: Today's radio access networks (RANs) are monolithic entities which often operate statically on a given set of parameters for the entirety of their operations. To implement realistic and effective spectrum sharing policies, RANs will need to seamlessly and intelligently change their operational parameters. In stark contrast with existing paradigms, the new O-RAN architectures for 5G-and-beyond netw… ▽ More

    Submitted 17 January, 2022; originally announced January 2022.

    Comments: 10 pages, accepted at IEEE INFOCOM 2022 IEEE Conference on Computer Communications, May 2022

  22. arXiv:2201.04235  [pdf, other

    cs.DC cs.CV cs.LG cs.NI

    SmartDet: Context-Aware Dynamic Control of Edge Task Offloading for Mobile Object Detection

    Authors: Davide Callegaro, Francesco Restuccia, Marco Levorato

    Abstract: Mobile devices increasingly rely on object detection (OD) through deep neural networks (DNNs) to perform critical tasks. Due to their high complexity, the execution of these DNNs requires excessive time and energy. Low-complexity object tracking (OT) can be used with OD, where the latter is periodically applied to generate "fresh" references for tracking. However, the frames processed with OD incu… ▽ More

    Submitted 11 January, 2022; originally announced January 2022.

  23. arXiv:2201.02693  [pdf, other

    cs.LG cs.CV eess.IV eess.SP

    BottleFit: Learning Compressed Representations in Deep Neural Networks for Effective and Efficient Split Computing

    Authors: Yoshitomo Matsubara, Davide Callegaro, Sameer Singh, Marco Levorato, Francesco Restuccia

    Abstract: Although mission-critical applications require the use of deep neural networks (DNNs), their continuous execution at mobile devices results in a significant increase in energy consumption. While edge offloading can decrease energy consumption, erratic patterns in channel quality, network and edge server load can lead to severe disruption of the system's key operations. An alternative approach, cal… ▽ More

    Submitted 14 April, 2022; v1 submitted 7 January, 2022; originally announced January 2022.

    Comments: Accepted to IEEE WoWMoM 2022. Code and models are available at https://github.com/yoshitomo-matsubara/bottlefit-split_computing

    Journal ref: 2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)

  24. arXiv:2201.00869  [pdf, other

    cs.NI eess.SP

    ReWiS: Reliable Wi-Fi Sensing Through Few-Shot Multi-Antenna Multi-Receiver CSI Learning

    Authors: Niloofar Bahadori, Jonathan Ashdown, Francesco Restuccia

    Abstract: Thanks to the ubiquitousness of Wi-Fi access points and devices, Wi-Fi sensing enables transformative applications in remote health care, security, and surveillance. Existing work has explored the usage of machine learning on channel state information (CSI) computed from Wi-Fi packets to classify events of interest. However, most of these algorithms require a significant amount of data collection,… ▽ More

    Submitted 19 April, 2022; v1 submitted 3 January, 2022; originally announced January 2022.

  25. arXiv:2112.03465  [pdf, other

    cs.LG

    Federated Deep Reinforcement Learning for the Distributed Control of NextG Wireless Networks

    Authors: Peyman Tehrani, Francesco Restuccia, Marco Levorato

    Abstract: Next Generation (NextG) networks are expected to support demanding tactile internet applications such as augmented reality and connected autonomous vehicles. Whereas recent innovations bring the promise of larger link capacity, their sensitivity to the environment and erratic performance defy traditional model-based control rationales. Zero-touch data-driven approaches can improve the ability of t… ▽ More

    Submitted 6 December, 2021; originally announced December 2021.

    Comments: 6pages

  26. arXiv:2110.10617  [pdf, other

    cs.NI cs.AI eess.SP

    Colosseum: Large-Scale Wireless Experimentation Through Hardware-in-the-Loop Network Emulation

    Authors: Leonardo Bonati, Pedram Johari, Michele Polese, Salvatore D'Oro, Subhramoy Mohanti, Miead Tehrani-Moayyed, Davide Villa, Shweta Shrivastava, Chinenye Tassie, Kurt Yoder, Ajeet Bagga, Paresh Patel, Ventz Petkov, Michael Seltser, Francesco Restuccia, Abhimanyu Gosain, Kaushik R. Chowdhury, Stefano Basagni, Tommaso Melodia

    Abstract: Colosseum is an open-access and publicly-available large-scale wireless testbed for experimental research via virtualized and softwarized waveforms and protocol stacks on a fully programmable, "white-box" platform. Through 256 state-of-the-art software-defined radios and a massive channel emulator core, Colosseum can model virtually any scenario, enabling the design, development and testing of sol… ▽ More

    Submitted 14 December, 2021; v1 submitted 20 October, 2021; originally announced October 2021.

  27. arXiv:2106.13263  [pdf, other

    cs.CR cs.AR

    AKER: A Design and Verification Framework for Safe andSecure SoC Access Control

    Authors: Francesco Restuccia, Andres Meza, Ryan Kastner

    Abstract: Modern systems on a chip (SoCs) utilize heterogeneous architectures where multiple IP cores have concurrent access to on-chip shared resources. In security-critical applications, IP cores have different privilege levels for accessing shared resources, which must be regulated by an access control system. AKER is a design and verification framework for SoC access control. AKER builds upon the Access… ▽ More

    Submitted 24 June, 2021; originally announced June 2021.

  28. Isadora: Automated Information Flow Property Generation for Hardware Designs

    Authors: Calvin Deutschbein, Andres Meza, Francesco Restuccia, Ryan Kastner, Cynthia Sturton

    Abstract: Isadora is a methodology for creating information flow specifications of hardware designs. The methodology combines information flow tracking and specification mining to produce a set of information flow properties that are suitable for use during the security validation process, and which support a better understanding of the security posture of the design. Isadora is fully automated; the user pr… ▽ More

    Submitted 2 October, 2021; v1 submitted 14 June, 2021; originally announced June 2021.

    Comments: 10 pages, 4 figures, accepted at ASHES 2021

  29. arXiv:2105.15105  [pdf, ps, other

    cs.NI cs.DC eess.SY

    SeReMAS: Self-Resilient Mobile Autonomous Systems Through Predictive Edge Computing

    Authors: Davide Callegaro, Marco Levorato, Francesco Restuccia

    Abstract: Edge computing enables Mobile Autonomous Systems (MASs) to execute continuous streams of heavy-duty mission-critical processing tasks, such as real-time obstacle detection and navigation. However, in practical applications, erratic patterns in channel quality, network load, and edge server load can interrupt the task flow execution, which necessarily leads to severe disruption of the system's key… ▽ More

    Submitted 11 July, 2021; v1 submitted 22 April, 2021; originally announced May 2021.

    Comments: Corrected typo in title

  30. arXiv:2105.03671  [pdf, other

    cs.LG cs.NI

    The Tags Are Alright: Robust Large-Scale RFID Clone Detection Through Federated Data-Augmented Radio Fingerprinting

    Authors: Mauro Piva, Gaia Maselli, Francesco Restuccia

    Abstract: Millions of RFID tags are pervasively used all around the globe to inexpensively identify a wide variety of everyday-use objects. One of the key issues of RFID is that tags cannot use energy-hungry cryptography. For this reason, radio fingerprinting (RFP) is a compelling approach that leverages the unique imperfections in the tag's wireless circuitry to achieve large-scale RFID clone detection. Re… ▽ More

    Submitted 8 May, 2021; originally announced May 2021.

  31. arXiv:2103.14918  [pdf, other

    cs.NI

    IEEE 802.11bf: Toward Ubiquitous Wi-Fi Sensing

    Authors: Francesco Restuccia

    Abstract: Wi-Fi is among the most successful wireless technologies ever invented. As Wi-Fi becomes more and more present in public and private spaces, it becomes natural to leverage its ubiquitousness to implement groundbreaking wireless sensing applications such as human presence detection, activity recognition, and object tracking, just to name a few. This paper reports ongoing efforts by the IEEE 802.11b… ▽ More

    Submitted 27 March, 2021; originally announced March 2021.

  32. arXiv:2103.04505  [pdf, other

    eess.SP cs.LG

    Split Computing and Early Exiting for Deep Learning Applications: Survey and Research Challenges

    Authors: Yoshitomo Matsubara, Marco Levorato, Francesco Restuccia

    Abstract: Mobile devices such as smartphones and autonomous vehicles increasingly rely on deep neural networks (DNNs) to execute complex inference tasks such as image classification and speech recognition, among others. However, continuously executing the entire DNN on mobile devices can quickly deplete their battery. Although task offloading to cloud/edge servers may decrease the mobile device's computatio… ▽ More

    Submitted 25 March, 2022; v1 submitted 7 March, 2021; originally announced March 2021.

    Comments: Accepted to ACM Computing Surveys (CSUR)

  33. arXiv:2103.03745  [pdf, other

    cs.NI cs.LG

    Can You Fix My Neural Network? Real-Time Adaptive Waveform Synthesis for Resilient Wireless Signal Classification

    Authors: Salvatore D'Oro, Francesco Restuccia, Tommaso Melodia

    Abstract: Thanks to its capability of classifying complex phenomena without explicit modeling, deep learning (DL) has been demonstrated to be a key enabler of Wireless Signal Classification (WSC). Although DL can achieve a very high accuracy under certain conditions, recent research has unveiled that the wireless channel can disrupt the features learned by the DL model during training, thus drastically redu… ▽ More

    Submitted 5 March, 2021; originally announced March 2021.

  34. SteaLTE: Private 5G Cellular Connectivity as a Service with Full-stack Wireless Steganography

    Authors: Leonardo Bonati, Salvatore D'Oro, Francesco Restuccia, Stefano Basagni, Tommaso Melodia

    Abstract: Fifth-generation (5G) systems will extensively employ radio access network (RAN) softwarization. This key innovation enables the instantiation of "virtual cellular networks" running on different slices of the shared physical infrastructure. In this paper, we propose the concept of Private Cellular Connectivity as a Service (PCCaaS), where infrastructure providers deploy covert network slices known… ▽ More

    Submitted 10 February, 2021; originally announced February 2021.

    Journal ref: Proceedings of IEEE INFOCOM, May 2021

  35. arXiv:2102.03750  [pdf, other

    cs.CR cs.NI

    What is a Blockchain? A Definition to Clarify the Role of the Blockchain in the Internet of Things

    Authors: Lorenzo Ghiro, Francesco Restuccia, Salvatore D'Oro, Stefano Basagni, Tommaso Melodia, Leonardo Maccari, Renato Lo Cigno

    Abstract: The use of the term blockchain is documented for disparate projects, from cryptocurrencies to applications for the Internet of Things (IoT), and many more. The concept of blockchain appears therefore blurred, as it is hard to believe that the same technology can empower applications that have extremely different requirements and exhibit dissimilar performance and security. This position paper elab… ▽ More

    Submitted 7 February, 2021; originally announced February 2021.

  36. DeepBeam: Deep Waveform Learning for Coordination-Free Beam Management in mmWave Networks

    Authors: Michele Polese, Francesco Restuccia, Tommaso Melodia

    Abstract: Highly directional millimeter wave (mmWave) radios need to perform beam management to establish and maintain reliable links. To do so, existing solutions mostly rely on explicit coordination between the transmitter (TX) and the receiver (RX), which significantly reduces the airtime available for communication and further complicates the network protocol design. This paper advances the state of the… ▽ More

    Submitted 7 June, 2021; v1 submitted 28 December, 2020; originally announced December 2020.

    Comments: 10 pages, 15 figures. Please cite it as M. Polese, F. Restuccia, and T. Melodia, "DeepBeam: Deep Waveform Learning for Coordination-Free Beam Management in mmWave Networks", Proc. of ACM Intl. Symp. on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing (ACM MobiHoc), October 2021

  37. arXiv:2005.04226  [pdf, other

    cs.NI eess.SP

    DeepFIR: Addressing the Wireless Channel Action in Physical-Layer Deep Learning

    Authors: Francesco Restuccia, Salvatore D'Oro, Amani Al-Shawabka, Bruno Costa Rendon, Stratis Ioannidis, Tommaso Melodia

    Abstract: Deep learning can be used to classify waveform characteristics (e.g., modulation) with accuracy levels that are hardly attainable with traditional techniques. Recent research has demonstrated that one of the most crucial challenges in wireless deep learning is to counteract the channel action, which may significantly alter the waveform features. The problem is further exacerbated by the fact that… ▽ More

    Submitted 8 May, 2020; originally announced May 2020.

    Comments: submitted to IEEE Transactions on Wireless Communications. arXiv admin note: substantial text overlap with arXiv:1904.07623

  38. arXiv:2005.02270  [pdf, other

    cs.NI eess.SP

    Hacking the Waveform: Generalized Wireless Adversarial Deep Learning

    Authors: Francesco Restuccia, Salvatore D'Oro, Amani Al-Shawabka, Bruno Costa Rendon, Kaushik Chowdhury, Stratis Ioannidis, Tommaso Melodia

    Abstract: This paper advances the state of the art by proposing the first comprehensive analysis and experimental evaluation of adversarial learning attacks to wireless deep learning systems. We postulate a series of adversarial attacks, and formulate a Generalized Wireless Adversarial Machine Learning Problem (GWAP) where we analyze the combined effect of the wireless channel and the adversarial waveform o… ▽ More

    Submitted 5 May, 2020; originally announced May 2020.

    Comments: submitted for publication, IEEE Transactions on Wireless Communications

  39. arXiv:2005.02262  [pdf, other

    cs.NI

    PolymoRF: Polymorphic Wireless Receivers Through Physical-Layer Deep Learning

    Authors: Francesco Restuccia, Tommaso Melodia

    Abstract: Today's wireless technologies are largely based on inflexible designs, which makes them inefficient and prone to a variety of wireless attacks. To address this key issue, wireless receivers will need to (i) infer on-the-fly the physical-layer parameters currently used by transmitters; and if needed, (ii) change their hardware and software structures to demodulate the incoming waveform. In this pap… ▽ More

    Submitted 5 May, 2020; originally announced May 2020.

    Comments: to appear in ACM MobiHoc 2020

  40. Sl-EDGE: Network Slicing at the Edge

    Authors: Salvatore D'Oro, Leonardo Bonati, Francesco Restuccia, Michele Polese, Michele Zorzi, Tommaso Melodia

    Abstract: Network slicing of multi-access edge computing (MEC) resources is expected to be a pivotal technology to the success of 5G networks and beyond. The key challenge that sets MEC slicing apart from traditional resource allocation problems is that edge nodes depend on tightly-intertwined and strictly-constrained networking, computation and storage resources. Therefore, instantiating MEC slices without… ▽ More

    Submitted 2 May, 2020; originally announced May 2020.

    Journal ref: ACM Mobihoc 2020

  41. arXiv:2004.10113  [pdf, other

    cs.NI eess.SP

    Deep Learning at the Physical Layer: System Challenges and Applications to 5G and Beyond

    Authors: Francesco Restuccia, Tommaso Melodia

    Abstract: The unprecedented requirements of the Internet of Things (IoT) have made fine-grained optimization of spectrum resources an urgent necessity. Thus, designing techniques able to extract knowledge from the spectrum in real time and select the optimal spectrum access strategy accordingly has become more important than ever. Moreover, 5G and beyond (5GB) networks will require complex management scheme… ▽ More

    Submitted 7 September, 2020; v1 submitted 21 April, 2020; originally announced April 2020.

    Comments: Accepted for publication in IEEE Communications Magazine

  42. arXiv:2003.08458  [pdf, other

    cs.NI

    My SIM is Leaking My Data: Exposing Self-Login Privacy Breaches in Smartphones

    Authors: Andrea Coletta, Gaia Maselli, Mauro Piva, Domenicomichele Silvestri, Francesco Restuccia

    Abstract: We expose a new security leak for smartphone users, which allows to stole user personal data by accessing the mobile operator user page when auto-login is employed. We show how any "apparently" genuine app can steal these data from some mobile operators, affecting more than 80% of Italian mobile smartphones.

    Submitted 8 April, 2020; v1 submitted 18 March, 2020; originally announced March 2020.

    Comments: Abstract and Template: typos corrected

  43. arXiv:1905.08130  [pdf, other

    cs.NI

    Toward Operator-to-Waveform 5G Radio Access Network Slicing

    Authors: Salvatore D'Oro, Francesco Restuccia, Tommaso Melodia

    Abstract: Radio access network (RAN) slicing realizes a vision where physical network resources that belong to a specific infrastructure provider can be shared among multiple mobile network operators (MNOs). Existing work in this area has addressed RAN slicing at different levels of network abstractions, but has often neglected the multitude of tightly intertwined inter-level operations involved in real-wor… ▽ More

    Submitted 20 May, 2019; originally announced May 2019.

  44. arXiv:1905.02250  [pdf, other

    cs.CR cs.NI eess.SP

    Hiding Data in Plain Sight: Undetectable Wireless Communications Through Pseudo-Noise Asymmetric Shift Keying

    Authors: Salvatore D'Oro, Francesco Restuccia, Tommaso Melodia

    Abstract: Undetectable wireless transmissions are fundamental to avoid eavesdroppers. To address this issue, wireless steganography hides covert information inside primary information by slightly modifying the transmitted waveform such that primary information will still be decodable, while covert information will be seen as noise by agnostic receivers. Since the addition of covert information inevitably de… ▽ More

    Submitted 6 May, 2019; originally announced May 2019.

    Journal ref: IEEE International Conference on Computer Communications (INFOCOM'19) 2019

  45. arXiv:1904.07623  [pdf, other

    cs.NI

    DeepRadioID: Real-Time Channel-Resilient Optimization of Deep Learning-based Radio Fingerprinting Algorithms

    Authors: Francesco Restuccia, Salvatore D'Oro, Amani Al-Shawabka, Mauro Belgiovine, Luca Angioloni, Stratis Ioannidis, Kaushik Chowdhury, Tommaso Melodia

    Abstract: Radio fingerprinting provides a reliable and energy-efficient IoT authentication strategy. By mapping inputs onto a very large feature space, deep learning algorithms can be trained to fingerprint large populations of devices operating under any wireless standard. One of the most crucial challenges in radio fingerprinting is to counteract the action of the wireless channel, which decreases fingerp… ▽ More

    Submitted 16 April, 2019; originally announced April 2019.

    Comments: To appear in ACM MobiHoc 2019, Catania, Italy

  46. arXiv:1904.07613  [pdf, other

    cs.NI

    Jam Sessions: Analysis and Experimental Evaluation of Advanced Jamming Attacks in MIMO Networks

    Authors: Liyang Zhang, Francesco Restuccia, Tommaso Melodia, Scott M. Pudleswki

    Abstract: In advanced jamming, the adversary intentionally concentrates the available energy budget on specific critical components (e.g., pilot symbols, acknowledgement packets, etc.) to (i) increase the jamming effectiveness, as more targets can be jammed with the same energy budget; and (ii) decrease the likelihood of being detected, as the channel is jammed for a shorter period of time. One of the funda… ▽ More

    Submitted 16 April, 2019; originally announced April 2019.

    Comments: To appear at ACM MobiHoc 2019, Catania, Italy

  47. arXiv:1903.07448  [pdf, other

    cs.CR

    Blockchain for the Internet of Things: Present and Future

    Authors: Francesco Restuccia, Salvatore D'Oro andSalil S. Kanhere, Tommaso Melodia, Sajal K. Das

    Abstract: One of the key challenges to the IoT's success is how to secure and anonymize billions of IoT transactions and devices per day, an issue that still lingers despite significant research efforts over the last few years. On the other hand, technologies based on blockchain algorithms are disrupting today's cryptocurrency markets and showing tremendous potential, since they provide a distributed transa… ▽ More

    Submitted 18 March, 2019; originally announced March 2019.

  48. arXiv:1903.05460  [pdf, other

    cs.NI cs.LG eess.SP

    Big Data Goes Small: Real-Time Spectrum-Driven Embedded Wireless Networking Through Deep Learning in the RF Loop

    Authors: Francesco Restuccia, Tommaso Melodia

    Abstract: The explosion of 5G networks and the Internet of Things will result in an exceptionally crowded RF environment, where techniques such as spectrum sharing and dynamic spectrum access will become essential components of the wireless communication process. In this vision, wireless devices must be able to (i) learn to autonomously extract knowledge from the spectrum on-the-fly; and (ii) react in real… ▽ More

    Submitted 12 March, 2019; originally announced March 2019.

    Comments: Accepted to IEEE INFOCOM 2019. arXiv admin note: text overlap with arXiv:1901.07947

  49. arXiv:1902.00389  [pdf, other

    cs.NI

    The Slice Is Served: Enforcing Radio Access Network Slicing in Virtualized 5G Systems

    Authors: Salvatore D'Oro, Francesco Restuccia, Alessandro Talamonti, Tommaso Melodia

    Abstract: The notions of softwarization and virtualization of the radio access network (RAN) of next-generation (5G) wireless systems are ushering in a vision where applications and services are physically decoupled from devices and network infrastructure. This crucial aspect will ultimately enable the dynamic deployment of heterogeneous services by different network operators over the same physical infrast… ▽ More

    Submitted 1 February, 2019; originally announced February 2019.

    Comments: Accepted for publication in IEEE INFOCOM 2019

  50. Machine Learning for Wireless Communications in the Internet of Things: A Comprehensive Survey

    Authors: Jithin Jagannath, Nicholas Polosky, Anu Jagannath, Francesco Restuccia, Tommaso Melodia

    Abstract: The Internet of Things (IoT) is expected to require more effective and efficient wireless communications than ever before. For this reason, techniques such as spectrum sharing, dynamic spectrum access, extraction of signal intelligence and optimized routing will soon become essential components of the IoT wireless communication paradigm. Given that the majority of the IoT will be composed of tiny,… ▽ More

    Submitted 18 July, 2019; v1 submitted 23 January, 2019; originally announced January 2019.

    Comments: Ad Hoc Networks Journal