skip to main content

Search for: All records

Creators/Authors contains: "Song, Houbing"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. The emerging concept of drone swarms creates new opportunities with major societal implications. However, future drone swarm applications and services pose new communications and sensing challenges, particularly for collaborative tasks. To address these challenges, in this paper, we integrate sensor arrays and communication to propose a mathematical model to route a collection of autonomous unmanned aerial systems (AUAS), a so-called drone swarm or AUAS swarm, without having a base station of communication but communicating with each other using multiple spatio-temporal data. The theories of structured matrices, concepts in multi-beam beamforming, and sensor arrays are utilized to propose a swarm routing algorithm. We address the routing algorithm’s computational and arithmetic complexities, precision, and reliability. We measure bit-error-rate (BER) based on the number of elements in sensor arrays and beamformed output of the members of the swarm to authenticate and secure the routing for the decentralized AUAS networking. The proposed model has the potential to enable future drone swarm applications and services. Finally, we discuss future work on obtaining a machine-learning-based low-cost drone swarm routing algorithm.
    Free, publicly-accessible full text available October 1, 2023
  2. Free, publicly-accessible full text available November 11, 2023
  3. Abnormal event detection with the lowest latency is an indispensable function for safety-critical systems, such as cyber defense systems. However, as systems become increasingly complicated, conventional sequential event detection methods become less effective, especially when we need to define indicator metrics from complicated data manually. Although Deep Neural Networks (DNNs) have been used to handle heterogeneous data, the theoretic assurability and explainability are still insufficient. This paper provides a holistic framework for the quickest and sequential detection of abnormalities and time-dependent abnormal events. We explore the latent space characteristics of zero-bias neural networks considering the classification boundaries and abnormalities. We then provide a novel method to convert zero-bias DNN classifiers into performance-assured binary abnormality detectors. Finally, we provide a sequential Quickest Detection (QD) scheme that provides the theoretically assured lowest abnormal event detection delay under false alarm constraints using the converted abnormality detector. We verify the effectiveness of the framework using real massive signal records in aviation communication systems and simulation. Codes and data are available at.
  4. Cyber-Physical Systems (CPS) connected in the form of Internet of Things (IoT) are vulnerable to various security threats, due to the infrastructure-less deployment of IoT devices. Device-to-Device (D2D) authentication of these networks ensures the integrity, authenticity, and confidentiality of information in the deployed area. The literature suggests different approaches to address security issues in CPS technologies. However, they are mostly based on centralized techniques or specific system deployments with higher cost of computation and communication. It is therefore necessary to develop an effective scheme that can resolve the security problems in CPS technologies of IoT devices. In this paper, a lightweight Hash-MAC-DSDV (Hash Media Access Control Destination Sequence Distance Vector) routing scheme is proposed to resolve authentication issues in CPS technologies, connected in the form of IoT networks. For this purpose, a CPS of IoT devices (multi-WSNs) is developed from the local-chain and public chain, respectively. The proposed scheme ensures D2D authentication by the Hash-MAC-DSDV mutual scheme, where the MAC addresses of individual devices are registered in the first phase and advertised in the network in the second phase. The proposed scheme allows legitimate devices to modify their routing table and unicast the one-way hash authentication mechanism to transfer theirmore »captured data from source towards the destination. Our evaluation results demonstrate that Hash-MAC-DSDV outweighs the existing schemes in terms of attack detection, energy consumption and communication metrics.« less
  5. The ubiquitous of 5G New Radio (5G NR) accelerates the massive implementations in many fields including swarm Unmanned Aircraft System (UAS) networking. The ultra capacities of 5G NR can provide more sufficient networking services for the swarm UAS networking which can enable swarm UAS to deploy in more complex and challenging scenarios to achieve missions. However, the conventional swarm UAS networking are mainly centralized or hierarchical which is vulnerable to the dynamics and the deployment of swarm UAS networking on a large scale. In this paper, we formulate a cell wall communications for the heterogeneous swarm UAS networking with the inspiration of biological cell wall communication. Fueled by reinforcement learning, we resolve the edge-coloring problem of cell wall communication scheduling to achieve the maximum throughput between the heterogeneous swarm UAS networking globally. The evaluation shows our proposed reinforcement learning enabled algorithm can surpass the conventional scheduling algorithms over 90% when the time piece is less than 0.01s and achieve the optimal throughput for the heterogeneous swarm UAS networking.
  6. Radio frequency (RF) signal classification has significantly been used for detecting and identifying the features of unknown unmanned aerial vehicles (UAVs). This paper proposes a method using empirical mode decomposition (EMD) and ensemble empirical mode decomposition (EEMD) on extracting the communication channel characteristics of intruding UAVs. The decomposed intrinsic mode functions (IMFs) except noise components are selected for RF signal pattern recognition based on machine learning (ML). The classification results show that the denoising effects introduced by EMD and EEMD could both fit in improving the detection accuracy with different features of RF communication channel, especially on identifying time-varying RF signal sources.