Skip to main content

Showing 1–4 of 4 results for author: Shila, D M

.
  1. arXiv:2112.02143  [pdf, other

    cs.RO cs.AI

    CTIN: Robust Contextual Transformer Network for Inertial Navigation

    Authors: Bingbing Rao, Ehsan Kazemi, Yifan Ding, Devu M Shila, Frank M. Tucker, Liqiang Wang

    Abstract: Recently, data-driven inertial navigation approaches have demonstrated their capability of using well-trained neural networks to obtain accurate position estimates from inertial measurement units (IMU) measurements. In this paper, we propose a novel robust Contextual Transformer-based network for Inertial Navigation~(CTIN) to accurately predict velocity and trajectory. To this end, we first design… ▽ More

    Submitted 20 December, 2021; v1 submitted 3 December, 2021; originally announced December 2021.

    Comments: Accepted as technical research paper in 36th AAAI Conference on Artificial Intelligence, 2022

  2. arXiv:2111.09445  [pdf, other

    cs.LG cs.AI cs.DC eess.SY

    FLSys: Toward an Open Ecosystem for Federated Learning Mobile Apps

    Authors: Xiaopeng Jiang, Han Hu, Vijaya Datta Mayyuri, An Chen, Devu M. Shila, Adriaan Larmuseau, Ruoming **, Cristian Borcea, NhatHai Phan

    Abstract: This article presents the design, implementation, and evaluation of FLSys, a mobile-cloud federated learning (FL) system, which can be a key component for an open ecosystem of FL models and apps. FLSys is designed to work on smart phones with mobile sensing data. It balances model performance with resource consumption, tolerates communication failures, and achieves scalability. In FLSys, different… ▽ More

    Submitted 10 March, 2023; v1 submitted 17 November, 2021; originally announced November 2021.

  3. Secure Key Establishment for Device-to-Device Communications

    Authors: Wenlong Shen, Weisheng Hong, Xianghui Cao, Bo Yin, Devu Manikantan Shila, Yu Cheng

    Abstract: With the rapid growth of smartphone and tablet users, Device-to-Device (D2D) communications have become an attractive solution for enhancing the performance of traditional cellular networks. However, relevant security issues involved in D2D communications have not been addressed yet. In this paper, we investigate the security requirements and challenges for D2D communications, and present a secure… ▽ More

    Submitted 9 October, 2014; originally announced October 2014.

    Comments: 5 pages, 4 figures, accepted to IEEE Globecom

  4. arXiv:1410.1613  [pdf, ps, other

    cs.CR cs.NI

    Ghost-in-the-Wireless: Energy Depletion Attack on ZigBee

    Authors: Devu Manikantan Shila, Xianghui Cao, Yu Cheng, Zequ Yang, Yang Zhou, Jiming Chen

    Abstract: ZigBee has been recently drawing a lot of attention as a promising solution for ubiquitous computing. The ZigBee devices are normally resource-limited, making the network susceptible to a variety of security threats. This paper presents a severe attack on ZigBee networks termed as ghost, which leverages the underlying vulnerabilities of the IEEE 802.15.4 security suites to deplete the energy of th… ▽ More

    Submitted 7 October, 2014; originally announced October 2014.