Skip to main content

Showing 1–27 of 27 results for author: Gursoy, M C

Searching in archive eess. Search in all archives.
.
  1. Resilient Path Planning for UAVs in Data Collection under Adversarial Attacks

    Authors: Xueyuan Wang, M. Cenk Gursoy

    Abstract: In this paper, we investigate jamming-resilient UAV path planning strategies for data collection in Internet of Things (IoT) networks, in which the typical UAV can learn the optimal trajectory to elude such jamming attacks. Specifically, the typical UAV is required to collect data from multiple distributed IoT nodes under collision avoidance, mission completion deadline, and kinematic constraints… ▽ More

    Submitted 11 December, 2023; originally announced January 2024.

    Comments: The final version of this paper has been accepted in IEEE Transactions on Information Forensics and Security

    Journal ref: vol. 18, pp. 2766-2779, 2023

  2. arXiv:2312.06250  [pdf, other

    eess.SY

    Robust and Decentralized Reinforcement Learning for UAV Path Planning in IoT Networks

    Authors: Xueyuan Wang, M. Cenk Gursoy

    Abstract: Unmanned aerial vehicle (UAV)-based networks and Internet of Things (IoT) are being considered as integral components of current and next-generation wireless networks. In particular, UAVs can provide IoT devices with seamless connectivity and high coverage and this can be accomplished with effective UAV path planning. In this article, we study robust and decentralized UAV path planning for dat… ▽ More

    Submitted 11 December, 2023; originally announced December 2023.

    Comments: 7 pages, 5 figures

  3. Learning-Based UAV Path Planning for Data Collection with Integrated Collision Avoidance

    Authors: Xueyuan Wang, M. Cenk Gursoy, Tugba Erpek, Yalin E. Sagduyu

    Abstract: Unmanned aerial vehicles (UAVs) are expected to be an integral part of wireless networks, and determining collision-free trajectory in multi-UAV non-cooperative scenarios while collecting data from distributed Internet of Things (IoT) nodes is a challenging task. In this paper, we consider a path planning optimization problem to maximize the collected data from multiple IoT nodes under realistic c… ▽ More

    Submitted 11 December, 2023; originally announced December 2023.

    Comments: The final version of this paper has been accepted in IEEE Internet of Things Journal

    Journal ref: Volume: 9, Issue: 17, 01 September 2022

  4. arXiv:2312.00088  [pdf, ps, other

    cs.LG eess.SP eess.SY

    Anomaly Detection via Learning-Based Sequential Controlled Sensing

    Authors: Geethu Joseph, Chen Zhong, M. Cenk Gursoy, Senem Velipasalar, Pramod K. Varshney

    Abstract: In this paper, we address the problem of detecting anomalies among a given set of binary processes via learning-based controlled sensing. Each process is parameterized by a binary random variable indicating whether the process is anomalous. To identify the anomalies, the decision-making agent is allowed to observe a subset of the processes at each time instant. Also, probing each process has an as… ▽ More

    Submitted 30 November, 2023; originally announced December 2023.

  5. arXiv:2201.09075  [pdf, ps, other

    cs.NI cs.LG eess.SY

    Dynamic Channel Access via Meta-Reinforcement Learning

    Authors: Ziyang Lu, M. Cenk Gursoy

    Abstract: In this paper, we address the channel access problem in a dynamic wireless environment via meta-reinforcement learning. Spectrum is a scarce resource in wireless communications, especially with the dramatic increase in the number of devices in networks. Recently, inspired by the success of deep reinforcement learning (DRL), extensive studies have been conducted in addressing wireless resource allo… ▽ More

    Submitted 24 December, 2021; originally announced January 2022.

  6. arXiv:2201.00879  [pdf, ps, other

    cs.LG eess.SP

    Temporal Detection of Anomalies via Actor-Critic Based Controlled Sensing

    Authors: Geethu Joseph, M. Cenk Gursoy, Pramod K. Varshney

    Abstract: We address the problem of monitoring a set of binary stochastic processes and generating an alert when the number of anomalies among them exceeds a threshold. For this, the decision-maker selects and probes a subset of the processes to obtain noisy estimates of their states (normal or anomalous). Based on the received observations, the decisionmaker first determines whether to declare that the num… ▽ More

    Submitted 16 June, 2023; v1 submitted 3 January, 2022; originally announced January 2022.

    Comments: 6 pages, 1 figure

  7. arXiv:2112.14709  [pdf, ps, other

    cs.IT eess.SY

    Dynamic Channel Access and Power Control in Wireless Interference Networks via Multi-Agent Deep Reinforcement Learning

    Authors: Ziyang Lu, Chen Zhong, M. Cenk Gursoy

    Abstract: Due to the scarcity in the wireless spectrum and limited energy resources especially in mobile applications, efficient resource allocation strategies are critical in wireless networks. Motivated by the recent advances in deep reinforcement learning (DRL), we address multi-agent DRL-based joint dynamic channel access and power control in a wireless interference network. We first propose a multi-age… ▽ More

    Submitted 24 December, 2021; originally announced December 2021.

  8. Joint Activity Detection and Channel Estimation in Cell-Free Massive MIMO Networks with Massive Connectivity

    Authors: Mangqing Guo, M. Cenk Gursoy

    Abstract: Cell-free massive MIMO is one of the key technologies for future wireless communications, in which users are simultaneously and jointly served by all access points (APs). In this paper, we investigate the minimum mean square error (MMSE) estimation of effective channel coefficients in cell-free massive MIMO systems with massive connectivity. To facilitate the theoretical analysis, only single meas… ▽ More

    Submitted 24 December, 2021; originally announced December 2021.

    Comments: 15 pages, 7 figures

    Journal ref: IEEE Transactions on Communications, 2021

  9. arXiv:2112.07840  [pdf, other

    eess.SY

    A Predictive Online Transient Stability Assessment with Hierarchical Generative Adversarial Networks

    Authors: Rui Ma, Sara Eftekharnejad, Chen Zhong, Mustafa Cenk Gursoy

    Abstract: Online transient stability assessment (TSA) is essential for secure and stable power system operations. The growing number of Phasor Measurement Units (PMUs) brings about massive sources of data that can enhance online TSA. However, conventional data-driven methods require large amounts of transient data to correctly assess the transient stability state of a system. In this paper, a new data-drive… ▽ More

    Submitted 14 December, 2021; originally announced December 2021.

  10. arXiv:2112.04912  [pdf, ps, other

    cs.LG eess.SP stat.ML

    Scalable and Decentralized Algorithms for Anomaly Detection via Learning-Based Controlled Sensing

    Authors: Geethu Joseph, Chen Zhong, M. Cenk Gursoy, Senem Velipasalar, Pramod K. Varshney

    Abstract: We address the problem of sequentially selecting and observing processes from a given set to find the anomalies among them. The decision-maker observes a subset of the processes at any given time instant and obtains a noisy binary indicator of whether or not the corresponding process is anomalous. In this setting, we develop an anomaly detection algorithm that chooses the processes to be observed… ▽ More

    Submitted 8 December, 2021; originally announced December 2021.

    Comments: 13 pages, 4 figures. arXiv admin note: substantial text overlap with arXiv:2105.06289

  11. arXiv:2108.07830  [pdf, other

    cs.IT eess.SP

    Higher Order Derivative-Based Receiver Pre-processing for Molecular Communications

    Authors: Mustafa Can Gursoy, Urbashi Mitra

    Abstract: While molecular communication via diffusion experiences significant inter-symbol interference (ISI), recent work suggests that ISI can be mitigated via time differentiation pre-processing which achieves pulse narrowing. Herein, the approach is generalized to higher order differentiation. The fundamental trade-off between ISI mitigation and noise amplification is characterized, showing the existenc… ▽ More

    Submitted 17 August, 2021; originally announced August 2021.

    Comments: 12 pages, 14 figures, submitted to IEEE Transactions on Molecular, Biological, and Multi-Scale Communications (pre-print)

  12. arXiv:2105.06289  [pdf, ps, other

    cs.LG eess.SP

    A Scalable Algorithm for Anomaly Detection via Learning-Based Controlled Sensing

    Authors: Geethu Joseph, M. Cenk Gursoy, Pramod K. Varshney

    Abstract: We address the problem of sequentially selecting and observing processes from a given set to find the anomalies among them. The decision-maker observes one process at a time and obtains a noisy binary indicator of whether or not the corresponding process is anomalous. In this setting, we develop an anomaly detection algorithm that chooses the process to be observed at a given time instant, decides… ▽ More

    Submitted 12 May, 2021; originally announced May 2021.

    Comments: 6 pages, 8 figures

    Journal ref: ICC 2021

  13. arXiv:2105.06288  [pdf, ps, other

    cs.LG eess.SP

    Anomaly Detection via Controlled Sensing and Deep Active Inference

    Authors: Geethu Joseph, Chen Zhong, M. Cenk Gursoy, Senem Velipasalar, Pramod K. Varshney

    Abstract: In this paper, we address the anomaly detection problem where the objective is to find the anomalous processes among a given set of processes. To this end, the decision-making agent probes a subset of processes at every time instant and obtains a potentially erroneous estimate of the binary variable which indicates whether or not the corresponding process is anomalous. The agent continues to probe… ▽ More

    Submitted 12 May, 2021; originally announced May 2021.

    Comments: 6 pages,9 figures

    Journal ref: Globecom 2020

  14. Uplink Coverage in Heterogeneous mmWave Cellular Networks with Clustered Users

    Authors: Xueyuan Wang, M. Cenk Gursoy

    Abstract: A K-tier heterogeneous mmWave uplink cellular network with clustered user equipments (UEs) is considered in this paper. In particular, UEs are assumed to be clustered around small-cell base stations (BSs) according to a Gaussian distribution, leading to the Thomas cluster process based modeling. Specific and practical line-of-sight (LOS) and non-line-of-sight (NLOS) models are adopted with differe… ▽ More

    Submitted 15 April, 2021; v1 submitted 3 April, 2021; originally announced April 2021.

    Comments: To be published in IEEE Access

  15. arXiv:2101.02869  [pdf, other

    cs.IT eess.SP

    Towards High Data-Rate Diffusive Molecular Communications: Performance Enhancement Strategies

    Authors: Mustafa Can Gursoy, Masoumeh Nasiri-Kenari, Urbashi Mitra

    Abstract: Diffusive molecular communications (DiMC) have recently gained attention as a candidate for nano- to micro- and macro-scale communications due to its simplicity and energy efficiency. As signal propagation is solely enabled by Brownian motion mechanics, DiMC faces severe inter-symbol interference (ISI), which limits reliable and high data-rate communications. Herein, recent literature on DiMC perf… ▽ More

    Submitted 8 January, 2021; originally announced January 2021.

    Comments: 19 pages, 15 figures

  16. arXiv:2008.05943  [pdf, ps, other

    eess.SP

    Multi-Agent Double Deep Q-Learning for Beamforming in mmWave MIMO Networks

    Authors: Xueyuan Wang, M. Cenk Gursoy

    Abstract: Beamforming is one of the key techniques in millimeter wave (mmWave) multi-input multi-output (MIMO) communications. Designing appropriate beamforming not only improves the quality and strength of the received signal, but also can help reduce the interference, consequently enhancing the data rate. In this paper, we propose a distributed multi-agent double deep Q-learning algorithm for beamforming… ▽ More

    Submitted 13 August, 2020; originally announced August 2020.

    Comments: To be published in IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) 2020

  17. arXiv:2007.08108  [pdf, ps, other

    cs.IT eess.SP

    Energy Harvesting in Unmanned Aerial Vehicle Networks with 3D Antenna Radiation Patterns

    Authors: Esma Turgut, M. Cenk Gursoy, Ismail Guvenc

    Abstract: In this paper, an analytical framework is provided to analyze the energy coverage performance of unmanned aerial vehicle (UAV) energy harvesting networks with clustered user equipments (UEs). Locations of UEs are modeled as a Poisson Cluster Process (PCP), and UAVs are assumed to be located at a certain height above the center of user clusters. Hence, user-centric UAV deployments are addressed. Tw… ▽ More

    Submitted 16 July, 2020; originally announced July 2020.

  18. Adversarial jamming attacks and defense strategies via adaptive deep reinforcement learning

    Authors: Feng Wang, Chen Zhong, M. Cenk Gursoy, Senem Velipasalar

    Abstract: As the applications of deep reinforcement learning (DRL) in wireless communications grow, sensitivity of DRL based wireless communication strategies against adversarial attacks has started to draw increasing attention. In order to address such sensitivity and alleviate the resulting security concerns, we in this paper consider a victim user that performs DRL-based dynamic channel access, and an at… ▽ More

    Submitted 12 July, 2020; originally announced July 2020.

    Comments: 13 pages, 24 figures

    MSC Class: 68T07 (Primary) 94A15 (Secondary)

  19. arXiv:2006.01044  [pdf, ps, other

    eess.SP cs.LG

    Anomaly Detection Under Controlled Sensing Using Actor-Critic Reinforcement Learning

    Authors: Geethu Joseph, M. Cenk Gursoy, Pramod K. Varshney

    Abstract: We consider the problem of detecting anomalies among a given set of processes using their noisy binary sensor measurements. The noiseless sensor measurement corresponding to a normal process is 0, and the measurement is 1 if the process is anomalous. The decision-making algorithm is assumed to have no knowledge of the number of anomalous processes. The algorithm is allowed to choose a subset of th… ▽ More

    Submitted 26 May, 2020; originally announced June 2020.

    Comments: 5 pages, 2 figures, accepted at 2020 IEEE 21st International Workshop on Signal Processing Advances in Wireless Communications (SPAWC)

  20. arXiv:2003.09785  [pdf, other

    cs.CV cs.LG eess.SP

    Mission-Aware Spatio-Temporal Deep Learning Model for UAS Instantaneous Density Prediction

    Authors: Ziyi Zhao, Zhao **, Wentian Bai, Wentan Bai, Carlos Caicedo, M. Cenk Gursoy, Qinru Qiu

    Abstract: The number of daily sUAS operations in uncontrolled low altitude airspace is expected to reach into the millions in a few years. Therefore, UAS density prediction has become an emerging and challenging problem. In this paper, a deep learning-based UAS instantaneous density prediction model is presented. The model takes two types of data as input: 1) the historical density generated from the histor… ▽ More

    Submitted 21 March, 2020; originally announced March 2020.

  21. arXiv:2002.11861  [pdf, other

    cs.MA eess.SP

    Simulation of Real-time Routing for UAS traffic Management with Communication and Airspace Safety Considerations

    Authors: Zhao **, Ziyi Zhao, Chen Luo, Franco Basti, Adrian Solomon, M. Cenk Gursoy, Carlos Caicedo, Qinru Qiu

    Abstract: Small Unmanned Aircraft Systems (sUAS) will be an important component of the smart city and intelligent transportation environments of the near future. The demand for sUAS related applications, such as commercial delivery and land surveying, is expected to grow rapidly in next few years. In general, sUAS traffic routing and management functions are needed to coordinate the launching of sUAS from d… ▽ More

    Submitted 26 February, 2020; originally announced February 2020.

    Comments: The 38th AIAA/IEEE Digital Avionics Systems Conference (DASC)

  22. arXiv:2001.06850  [pdf, other

    cs.IT eess.SP

    Optimal Resource Allocation in Ground Wireless Networks Supporting Unmanned Aerial Vehicle Transmissions

    Authors: Yulin Hu, Guodong Sun, Guohua Zhang, M. Cenk Gursoy, Anke Schmeink

    Abstract: We consider a fully-loaded ground wireless network supporting unmanned aerial vehicle (UAV) transmission services. To enable the overload transmissions to a ground user (GU) and a UAV, two transmission schemes are employed, namely non-orthogonal multiple access (NOMA) and relaying, depending on whether or not the GU and UAV are served simultaneously. Under the assumption of the system operating wi… ▽ More

    Submitted 19 January, 2020; originally announced January 2020.

    Comments: 13 pages, 13 figures

  23. Coverage Analysis for Energy-Harvesting UAV-assisted mmWave Cellular Networks

    Authors: Xueyuan Wang, M. Cenk Gursoy

    Abstract: In this paper, we jointly consider the downlink simultaneous wireless information and power transfer (SWIPT) and uplink information transmission in unmanned aerial vehicle (UAV)-assisted millimeter wave (mmWave) cellular networks, in which the user equipment (UE) locations are modeled using Poisson cluster processes (e.g., Thomas cluster processes or Matérn cluster processes). Distinguishing featu… ▽ More

    Submitted 22 October, 2019; originally announced October 2019.

  24. arXiv:1905.03471  [pdf, other

    eess.SP

    RSS-Based Detection of Drones in the Presence of RF Interferers

    Authors: Priyanka Sinha, Yavuz Yapici, Ismail Guvenc, Esma Turgut, M. Cenk Gursoy

    Abstract: Drones will have extensive use cases across various commercial, government, and military sectors, ranging from delivery of consumer goods to search and rescue operations. To maintain the safety and security of people and infrastructure, it becomes critically important to quickly and accurately detect non-cooperating drones. In this paper we formulate a received signal strength (RSS) based detector… ▽ More

    Submitted 3 June, 2019; v1 submitted 9 May, 2019; originally announced May 2019.

    Comments: 8 pages, Aggregate interference amplitude, LOS/NLOS, nearest neighbor, PPP, stochastic geometry, drone detection, UTM

  25. arXiv:1902.04035  [pdf

    eess.SY

    A Simulation Framework for Fast Design Space Exploration of Unmanned Air System Traffic Management Policies

    Authors: Ziyi Zhao, Chen Luo, ** Zhao, Qinru Qiu, M. Cenk Gursoy, Carlos Caicedo, Franco Basti

    Abstract: The number of daily small Unmanned Aircraft Systems (sUAS) operations in uncontrolled low altitude airspace is expected to reach into the millions. UAS Traffic Management (UTM) is an emerging concept aiming at the safe and efficient management of such very dense traffic, but few studies are addressing the policies to accommodate such demand and the required ground infrastructure in suburban or urb… ▽ More

    Submitted 14 February, 2019; v1 submitted 11 February, 2019; originally announced February 2019.

    Comments: The Integrated Communications Navigation and Surveillance (ICNS) Conference in 2019

  26. arXiv:1810.07548  [pdf, ps, other

    cs.LG cs.IT eess.IV stat.ML

    Deep Learning Based Power Control for Quality-Driven Wireless Video Transmissions

    Authors: Chuang Ye, M. Cenk Gursoy, Senem Velipasalar

    Abstract: In this paper, wireless video transmission to multiple users under total transmission power and minimum required video quality constraints is studied. In order to provide the desired performance levels to the end-users in real-time video transmissions while using the energy resources efficiently, we assume that power control is employed. Due to the presence of interference, determining the optimal… ▽ More

    Submitted 16 October, 2018; originally announced October 2018.

    Comments: arXiv admin note: text overlap with arXiv:1707.08232

  27. arXiv:1809.10296  [pdf, other

    cs.IT eess.SP

    Learning-Based Delay-Aware Caching in Wireless D2D Caching Networks

    Authors: Yi Li, Chen Zhong, M. Cenk Gursoy, Senem Velipasalar

    Abstract: Recently, wireless caching techniques have been studied to satisfy lower delay requirements and offload traffic from peak periods. By storing parts of the popular files at the mobile users, users can locate some of their requested files in their own caches or the caches at their neighbors. In the latter case, when a user receives files from its neighbors, device-to-device(D2D) communication is per… ▽ More

    Submitted 26 September, 2018; originally announced September 2018.

    Comments: 14 pages, 11 figures. arXiv admin note: text overlap with arXiv:1704.01984