Defense Notices


All students and faculty are welcome to attend the final defense of EECS graduate students completing their M.S. or Ph.D. degrees. Defense notices for M.S./Ph.D. presentations for this year and several previous years are listed below in reverse chronological order.

Students who are nearing the completion of their M.S./Ph.D. research should schedule their final defenses through the EECS graduate office at least THREE WEEKS PRIOR to their presentation date so that there is time to complete the degree requirements check, and post the presentation announcement online.

Upcoming Defense Notices

Elizabeth Wyss

A New Frontier for Software Security: Diving Deep into npm

When & Where:


Eaton Hall, Room 2001B

Committee Members:

Drew Davidson, Chair
Alex Bardas
Fengjun Li
Bo Luo
J. Walker

Abstract

Open-source package managers (e.g., npm for Node.js) have become an established component of modern software development. Rather than creating applications from scratch, developers may employ modular software dependencies and frameworks--called packages--to serve as building blocks for writing larger applications. Package managers make this process easy. With a simple command line directive, developers are able to quickly fetch and install packages across vast open-source repositories. npm--the largest of such repositories--alone hosts millions of unique packages and serves billions of package downloads each week. 

However, the widespread code sharing resulting from open-source package managers also presents novel security implications. Vulnerable or malicious code hiding deep within package dependency trees can be leveraged downstream to attack both software developers and the end-users of their applications. This downstream flow of software dependencies--dubbed the software supply chain--is critical to secure.

This research provides a deep dive into the npm-centric software supply chain, exploring distinctive phenomena that impact its overall security and usability. Such factors include (i) hidden code clones--which may stealthily propagate known vulnerabilities, (ii) install-time attacks enabled by unmediated installation scripts, (iii) hard-coded URLs residing in package code, (iv) the impacts of open-source development practices, (v) package compromise via malicious updates, (vi) spammers disseminating phishing links within package metadata, and (vii) abuse of cryptocurrency protocols designed to reward the creators of high-impact packages. For each facet, tooling is presented to identify and/or mitigate potential security impacts. Ultimately, it is our hope that this research fosters greater awareness, deeper understanding, and further efforts to forge a new frontier for the security of modern software supply chains. 


Alfred Fontes

Optimization and Trade-Space Analysis of Pulsed Radar-Communication Waveforms using Constant Envelope Modulations

When & Where:


Nichols Hall, Room 246 (Executive Conference Room)

Committee Members:

Patrick McCormick, Chair
Shannon Blunt
Jonathan Owen


Abstract

Dual function radar communications (DFRC) is a method of co-designing a single radio frequency system to perform simultaneous radar and communications service. DFRC is ultimately a compromise between radar sensing performance and communications data throughput due to the conflicting requirements between the sensing and information-bearing signals.

A novel waveform-based DFRC approach is phase attached radar communications (PARC), where a communications signal is embedded onto a radar pulse via the phase modulation between the two signals. The PARC framework is used here in a new waveform design technique that designs the radar component of a PARC signal to match the PARC DFRC waveform expected power spectral density (PSD) to a desired spectral template. This provides better control over the PARC signal spectrum, which mitigates the issue of PARC radar performance degradation from spectral growth due to the communications signal. 

The characteristics of optimized PARC waveforms are then analyzed to establish a trade-space between radar and communications performance within a PARC DFRC scenario. This is done by sampling the DFRC trade-space continuum with waveforms that contain a varying degree of communications bandwidth, from a pure radar waveform (no embedded communications) to a pure communications waveform (no radar component). Radar performance, which is degraded by range sidelobe modulation (RSM) from the communications signal randomness, is measured from the PARC signal variance across pulses; data throughput is established as the communications performance metric. Comparing the values of these two measures as a function of communications symbol rate explores the trade-offs in performance between radar and communications with optimized PARC waveforms.


Arin Dutta

Performance Analysis of Distributed Raman Amplification with Different Pumping Configurations

When & Where:


Nichols Hall, Room 246 (Executive Conference Room)

Committee Members:

Rongqing Hui, Chair
Morteza Hashemi
Rachel Jarvis
Alessandro Salandrino
Hui Zhao

Abstract

As internet services like high-definition videos, cloud computing, and artificial intelligence keep growing, optical networks need to keep up with the demand for more capacity. Optical amplifiers play a crucial role in offsetting fiber loss and enabling long-distance wavelength division multiplexing (WDM) transmission in high-capacity systems. Various methods have been proposed to enhance the capacity and reach of fiber communication systems, including advanced modulation formats, dense wavelength division multiplexing (DWDM) over ultra-wide bands, space-division multiplexing, and high-performance digital signal processing (DSP) technologies. To maintain higher data rates along with maximizing the spectral efficiency of multi-level modulated signals, a higher Optical Signal-to-Noise Ratio (OSNR) is necessary. Despite advancements in coherent optical communication systems, the spectral efficiency of multi-level modulated signals is ultimately constrained by fiber nonlinearity. Raman amplification is an attractive solution for wide-band amplification with low noise figures in multi-band systems.

Distributed Raman Amplification (DRA) have been deployed in recent high-capacity transmission experiments to achieve a relatively flat signal power distribution along the optical path and offers the unique advantage of using conventional low-loss silica fibers as the gain medium, effectively transforming passive optical fibers into active or amplifying waveguides. Also, DRA provides gain at any wavelength by selecting the appropriate pump wavelength, enabling operation in signal bands outside the Erbium doped fiber amplifier (EDFA) bands. Forward (FW) Raman pumping configuration in DRA can be adopted to further improve the DRA performance as it is more efficient in OSNR improvement because the optical noise is generated near the beginning of the fiber span and attenuated along the fiber. Dual-order FW pumping scheme helps to reduce the non-linear effect of the optical signal and improves OSNR by more uniformly distributing the Raman gain along the transmission span.

The major concern with Forward Distributed Raman Amplification (FW DRA) is the fluctuation in pump power, known as relative intensity noise (RIN), which transfers from the pump laser to both the intensity and phase of the transmitted optical signal as they propagate in the same direction. Additionally, another concern of FW DRA is the rise in signal optical power near the start of the fiber span, leading to an increase in the non-linear phase shift of the signal. These factors, including RIN transfer-induced noise and non-linear noise, contribute to the degradation of system performance in FW DRA systems at the receiver.

As the performance of DRA with backward pumping is well understood with relatively low impact of RIN transfer, our research  is focused on the FW pumping configuration, and is intended to provide a comprehensive analysis on the system performance impact of dual order FW Raman pumping, including signal intensity and phase noise induced by the RINs of both 1st and the 2nd order pump lasers, as well as the impacts of linear and nonlinear noise. The efficiencies of pump RIN to signal intensity and phase noise transfer are theoretically analyzed and experimentally verified by applying a shallow intensity modulation to the pump laser to mimic the RIN. The results indicate that the efficiency of the 2nd order pump RIN to signal phase noise transfer can be more than 2 orders of magnitude higher than that from the 1st order pump. Then the performance of the dual order FW Raman configurations is compared with that of single order Raman pumping to understand trade-offs of system parameters. The nonlinear interference (NLI) noise is analyzed to study the overall OSNR improvement when employing a 2nd order Raman pump. Finally, a DWDM system with 16-QAM modulation is used as an example to investigate the benefit of DRA with dual order Raman pumping and with different pump RIN levels. We also consider a DRA system using a 1st order incoherent pump together with a 2nd order coherent pump. Although dual order FW pumping corresponds to a slight increase of linear amplified spontaneous emission (ASE) compared to using only a 1st order pump, its major advantage comes from the reduction of nonlinear interference noise in a DWDM system. Because the RIN of the 2nd order pump has much higher impact than that of the 1st order pump, there should be more stringent requirement on the RIN of the 2nd order pump laser when dual order FW pumping scheme is used for DRA for efficient fiber-optic communication. Also, the result of system performance analysis reveals that higher baud rate systems, like those operating at 100Gbaud, are less affected by pump laser RIN due to the low-pass characteristics of the transfer of pump RIN to signal phase noise.


Audrey Mockenhaupt

Using Dual Function Radar Communication Waveforms for Synthetic Aperture Radar Automatic Target Recognition

When & Where:


Nichols Hall, Room 246 (Executive Conference Room)

Committee Members:

Patrick McCormick, Chair
Shannon Blunt
Jon Owen


Abstract

Pending.


Rich Simeon

Delay-Doppler Channel Estimation for High-Speed Aeronautical Mobile Telemetry Applications

When & Where:


Eaton Hall, Room 2001B

Committee Members:

Erik Perrins, Chair
Shannon Blunt
Morteza Hashemi
Jim Stiles
Craig McLaughlin

Abstract

The next generation of digital communications systems aims to operate in high-Doppler environments such as high-speed trains and non-terrestrial networks that utilize satellites in low-Earth orbit. Current generation systems use Orthogonal Frequency Division Multiplexing modulation which is known to suffer from inter-carrier interference (ICI) when different channel paths have dissimilar Doppler shifts.

A new Orthogonal Time Frequency Space (OTFS) modulation (also known as Delay-Doppler modulation) is proposed as a candidate modulation for 6G networks that is resilient to ICI. To date, OTFS demodulation designs have focused on the use cases of popular urban terrestrial channel models where path delay spread is a fraction of the OTFS symbol duration. However, wireless wide-area networks that operate in the aeronautical mobile telemetry (AMT) space can have large path delay spreads due to reflections from distant geographic features. This presents problems for existing channel estimation techniques which assume a small maximum expected channel delay, since data transmission is paused to sound the channel by an amount equal to twice the maximum channel delay. The dropout in data contributes to a reduction in spectral efficiency.

Our research addresses OTFS limitations in the AMT use case. We start with an exemplary OTFS framework with parameters optimized for AMT. Following system design, we focus on two distinct areas to improve OTFS performance in the AMT environment. First we propose a new channel estimation technique using a pilot signal superimposed over data that can measure large delay spread channels with no penalty in spectral efficiency. A successive interference cancellation algorithm is used to iteratively improve channel estimates and jointly decode data. A second aspect of our research aims to equalize in delay-Doppler space. In the delay-Doppler paradigm, the rapid channel variations seen in the time-frequency domain is transformed into a sparse quasi-stationary channel in the delay-Doppler domain. We propose to use machine learning using Gaussian Process Regression to take advantage of the sparse and stationary channel and learn the channel parameters to compensate for the effects of fractional Doppler in which simpler channel estimation techniques cannot mitigate. Both areas of research can advance the robustness of OTFS across all communications systems.


Mohammad Ful Hossain Seikh

AAFIYA: Antenna Analysis in Frequency-domain for Impedance and Yield Assessment

When & Where:


Eaton Hall, Room 2001B

Committee Members:

Jim Stiles, Chair
Rachel Jarvis
Alessandro Salandrino


Abstract

This project presents AAFIYA (Antenna Analysis in Frequency-domain for Impedance and Yield Assessment), a modular Python toolkit developed to automate and streamline the characterization and analysis of radiofrequency (RF) antennas using both measurement and simulation data. Motivated by the need for reproducible, flexible, and publication-ready workflows in modern antenna research, AAFIYA provides comprehensive support for all major antenna metrics, including S-parameters, impedance, gain and beam patterns, polarization purity, and calibration-based yield estimation. The toolkit features robust data ingestion from standard formats (such as Touchstone files and beam pattern text files), vectorized computation of RF metrics, and high-quality plotting utilities suitable for scientific publication.

Validation was carried out using measurements from industry-standard electromagnetic anechoic chamber setups involving both Log Periodic Dipole Array (LPDA) reference antennas and Askaryan Radio Array (ARA) Bottom Vertically Polarized (BVPol) antennas, covering a frequency range of 50–1500 MHz. Key performance metrics, such as broadband impedance matching, S11 and S21 related calculations, 3D realized gain patterns, vector effective lengths,  and cross-polarization ratio, were extracted and compared against full-wave electromagnetic simulations (using HFSS and WIPL-D). The results demonstrate close agreement between measurement and simulation, confirming the reliability of the workflow and calibration methodology.

AAFIYA’s open-source, extensible design enables rapid adaptation to new experiments and provides a foundation for future integration with machine learning and evolutionary optimization algorithms. This work not only delivers a validated toolkit for antenna research and pedagogy but also sets the stage for next-generation approaches in automated antenna design, optimization, and performance analysis.


Past Defense Notices

Dates

BENJAMIN EWY

Collaborative Approaches to Probabilistic Reasoning in Network Management

When & Where:


246 Nichols Hall

Committee Members:

Joseph Evans, Chair
Arvin Agah
Victor Frost
Gary Minden
Bozenna Pasik-Duncan

Abstract

Tactical networks, networks designed to facilitate command and control capabilities for militaries, have key attributes that differ from the commercial Internet. Characterizing, modeling, and ex- ploiting our understanding of these differences is the focus of this research. 
The differences between tactical and commercial networks can be found primarily in the areas of access bandwidth, access diversity, access latency, core latency, subnet distribution, and network infrastructure. In this work we characterize and model these differences. These key attributes affect research into issues such as peer-to-peer protocols, service discovery, and server selection among others, as well as the deployment of services and systems in tactical networks. Researchers traditionally struggle with measuring, analyzing, or testing new ideas on tactical networks due to a lack of direct access, and thus this characterization is crucial to evolving this research field. 
In this work we develop a topology generator that creates realistic tactical networks that can be visualized, analyzed, and emulated. 
Topological features including geographically constrained line of sight networks, high density low bandwidth satellite networks, and the latest high bandwidth on- the-move networks are captured. All of these topological features can be mixed to create realistic networks for many different tactical scenarios. A web based visualization tool is developed, as well as the ability to export topologies to the Mininet network virtualization environment. 
Finally, state-of-the-art server selection algorithms are reviewed and found to perform poorly for tactical networks. We develop a collaborative algorithm tailored to the attributes of tactical networks, and utilize our generated networks to assess the algorithm, finding a reduction in utilized bandwidth and a significant reduction in client to server latency as key improvements.


MEENAKSHI MISHRA

Task Relationship Modeling in Multitask Learning with Applications to Computational Toxicity

When & Where:


246 Nichols Hall

Committee Members:

Luke Huan, Chair
Arvin Agah
Swapan Chakrabarti
Ron Hui
Zhou Wang

Abstract

Multitask Learning is a learning framework which explores the concept of sharing training information among multiple related tasks to improve the generalization error of each task. The benefits of multitask learning have been shown both empirically and theoretically. There are a number of fields that benefit from multitask learning, including toxicology. However, the current multitask learning algorithms make a very important key assumption that all the tasks are related to each other in a similar fashion in multitask learning. The users often do not have the knowledge of which tasks are related and train all tasks together. This results in sharing of training information even among the unrelated tasks. Training unrelated tasks together can cause a negative transfer and deteriorate the performance of multitask learning. For example, consider the case of predicting in vivo toxicity of chemicals at various endpoints from the chemical structure. Toxicity at all the endpoints are not related. Since, biological networks are highly complex, it is also not possible to predetermine which endpoints are related. Thus, training all the endpoints together may cause a negative effect on the overall performance. This proposal aims at developing algorithms which make use of task relationship models to further improve the generalization error and prevent transfer of information among the unrelated tasks. The algorithms proposed here either learn the task relationships or utilize the known task relationships in the learning framework. Further, these algorithms will be utilized to predict toxicity of chemicals at various endpoints using the chemical structures and the results of multiple in vitro assays performed on these chemicals.


YINGYING MA

A Comparison of Two Discretization Options of the MLEM2 Algorithm

When & Where:


2001B Eaton Hall

Committee Members:

Jerzy Grzymala-Busse, Chair
Luke Huan
Prasad Kulkarni


Abstract

A rule set is a popular symbolic representation of knowledge derived from 
data. A rule induction is an important technique of data mining or machine 
learning. Many rule induction algorithms are widely used, such as LEM1, LEM2 and MLEM2. Some of these algorithms perform better on special data, e. g., on inconsistent data set or data sets with missing attribute values. This work discusses basic ideas of the MLEM2 algorithm, especially, how it handles data sets with numeric attribute values. Additionally, a comparison of the performance of different discretization options of the MLEM2 algorithm is also included.


FRANK MOLEY

Maintaining Privacy and Security of Personally Identifiable Information Data in a Connected System

When & Where:


280 Best

Committee Members:

Hossein Saiedian, Chair
Fengjun Li
Bo Luo


Abstract

The large data stores of Personally Identifiable Information (PII) in todays connected systems, coupled with the increased potential damages of Identity Theft bring the need for architectures that provide secure collection, storage, and transmission of this data. The need has not yet been standardized in the industry in a way similar to the Payment Card Industry (PCI) has done so. At the same time, however, municipalities, states, and even countries are instituting legislature that requires business entities that store PII data to maintain adequate security of the data. The need has become clear for a set of processes, procedures, and systems that provide a framework for securely storing PII data. This project defines the lower level datastore system and associated services for that PII data. It also outlines a network architecture prototype for providing segmented security zones used to provide more layers of security in a connected system.


KALYANI HARIDASYAM

AskMyNetwork: Finding Reliable Feedback and Reviews

When & Where:


280 Best

Committee Members:

Hossein Saiedian, Chair
Fengjun Li
Bo Luo


Abstract

We all consult online reviews before obtaining a product or service. However, not all the reviews can be trusted. For example, in 2013, "Operation Clean Turf” a yearlong sting operation in New York State, caught 19different companies that were writing fake reviews in online forums like Yelp for businesses that paid them. For my project, I've developed an application called AskMyNetwork. AskMyNetwork interfaces with Facebook to obtain feedback or input from a user's Facebook friends.The rationale for my project is that the feedback or inputs are from "friends" (personal friends, family members,or colleagues in a user's Facebook friends' list) and can be trusted. 

AskMyNetwork has four major components namely, Login,Search My Network, Ask My Network and Notifications. Using the Login component, the user can login to the application with Facebook credentials. Using Search My Network component, the user can define search criteria (e.g.,search for restaurant in Kansas City) and search his or her Facebook data for relevant results. Using Ask My Network component, the user can ask a group of friends question about a product or service they would like an opinion on. The group of friends can either be chosen by name or by the current location of the friends. Using the Notifications component, the user can view the responses given to questions asked from AskMyNetwork. 

I validated AskMyNetwork via a number of inquiries on topics such as restaurants, places to visit in a city and arts. The results of the validation were satisfactory.


MUHARREM ALI TUNC

LPTV-Aware Bit Loading and Channel Estimation in Broadband PLC for Smart Grid

When & Where:


246 Nichols Hall

Committee Members:

Erik Perrins, Chair
Shannon Blunt
Lingjia Liu
James Sterbenz
Atanas Stefanov

Abstract

Power line communication (PLC) has received steady interest over recent decades because of its economic use of existing power lines, and is one of the communication technologies envisaged for Smart Grid infrastructure. However, power lines are not designed for data communication, and this brings unique challenges for data communication over power lines. In particular for broadband (BB) PLC, the channel exhibits linear periodically time varying (LPTV) behavior synchronous to the AC mains cycle due to time varying impedances, impulsive noise due to switching events in the power line network is present in addition to background noise. In this work, we focus on two major aspects of an orthogonal frequency division multiplexing (OFDM) system for BB PLC LPTV channels; bit and power allocation, and channel estimation (CE). 

For the problem of optimal bit and power allocation, we present that the application of a power constraint that is averaged over many microslots can be exploited for further performance improvements through bit loading. Due to the matroid structure of the optimization problem, greedy-type algorithms are proven to be optimal for the new LPTV-aware bit and power loading. Next, two mechanisms are utilized to reduce the complexity of the optimal LPTV-aware bit loading and peak microslot power levels: employing representative values from microslot transfer functions, and power clipping. 

Next, we introduce a robust CE scheme with low overhead that addresses the drawbacks of block-type pilot arrangement and decision directed CE schemes such as large estimation overhead, and difficulty in channel tracking in the case of sudden changes in the channel, respectively. A transform domain (TD) analysis approach is developed to determine the cause of changes in the channel estimates. The result of TD analysis is then exploited in the proposed scheme to mitigate the effects of LPTV channel and impulsive noise. 

Our results indicate that the proposed reduced complexity LPTV-aware bit loading with power clipping algorithm performs close to the optimal scheme, and the proposed CE scheme based on TD analysis has low estimation overhead and is robust to changes in the channel and noise, making them good alternatives for BB PLC LPTV channels.


BRIAN CORDILL

Radar System Enhancement through High Fidelity Electromagnetic Modeling

When & Where:


129 Nichols

Committee Members:

Sarah Seguin, Chair
Shannon Blunt
Chris Allen
Jim Stiles
Mark Ewing

Abstract

Many of the innovative algorithms that permeate the field of array processing are based on a very simple signal model of an array. This simple, although powerful, model is at times a pale reflection of the complexities inherent in the physical world, and this model mismatch opens the door to the performance degradation of any solution for which the model underpins. This dissertation seeks to explore the impact of model mismatch upon common array processing algorithms. Model mismatch is examined in two ways: First, by developing a blind array calibration routine that estimates model mismatch and incorporates that knowledge into the RISR direction of arrival estimation algorithm. Second, by examining model mismatch between a transmitting and receiving antenna array, and assessing the impact of this mismatch on prolific direction of arrival estimation algorithms. In both of these studies it is shown that engineers have traded algorithm performance of model simplicity, and that if we are willing to deal with the added complexity we can recapture that lost performance.


JOSHUA DAVIS

A Covert Channel Using Named Resources

When & Where:


246 Nichols Hall

Committee Members:

Victor Frost, Chair
Fengjun Li
Bo Luo


Abstract

A method of transmitting information clandestinely over a variety of network protocols is designed and discussed. A demonstrative implementation is created that utilizes the ubiquitous Hypertext Transfer Protocol (HTTP) and the world wide web. Key contributions include the use of access ordering to convey information, and the modulation of transaction level timing to emulate user behavior.


NAHAL NIAKAN

Mutual Coupling Reduction Between Closely Spaced U-slot Patch Antennas by Optimizing Array Configuration and Its Applications in MIMO

When & Where:


2001B Eaton Hall

Committee Members:

Sarah Seguin, Chair
Chris Allen
Jim Stiles


Abstract

Multiple-input, multiple-output (MIMO) systems have received considerable attention over the last decade due to their ability to provide high throughputs and mitigate multipath fading effects. There are some limitations to get the most from MIMO, such as mutual coupling between 
antenna elements in an array. Mutual coupling and therefore inter element spacing have important effect on the channel capacity of MIMO communication system, its error rate and ambiguity of MIMO radar system. There are huge numbers of researches that focus on reducing the mutual coupling in antenna arrays and improve MIMO performance. Antenna design affects the performance of Multiple-Input–Multiple-output (MIMO) systems. Two aspects of antenna role in MIMO performance have been investigated in this thesis. Employing suitable antenna can have significant impact on performance of MIMO system. In addition to antenna design another antenna related issue that helps to optimize the system performance is to reduce mutual coupling between antenna elements in an array.Effect of antenna configuration in array on mutual coupling has been studied in this research. Main purpose is to find the array configuration which provides minimum mutual coupling between elements. U-slot patch antenna which because of its features like wide bandwidth ,multi band resonance and ease to achieve different polarizations has attracted lots of researchers has been used in this study.


ZAID HAYYEH

Exploiting Wireless Networks for Covert Communications

When & Where:


246 Nichols Hall

Committee Members:

Victor Frost, Chair
Shannon Blunt
Erik Perrins
David Petr
Jeffrey Lang

Abstract

The desire to hide communications has existed since antiquity. This includes hiding the existence of the transmission and the location of the sender. Wireless networks offer an opportunity for hiding a transmission by placing a signal in the radio frequency (RF) occupied by a target network which also has the added benefit of lowering its probability of detection. 

This research hides a signal within the RF environment of a packet based wireless (infrastructure) network. Specifically, in this research the interfering (covert) signal is placed in the guard band of the target network’s orthogonal frequency division multiplexed (OFDM) signal. We show that the existence of adaptive protocols allow the target network to adjust to the existence of the covert signal. In other words, the wireless network views the covert network as a minor change in the RF environment; this work shows that the covert signal can be indistinguishable from other wireless impairments such as fading. 

The impact of the covert signal on the target system performance is discovered through analysis and simulation; the analysis and simulation begin at the physical layer where the interaction between the target and covert systems occurs. After that, analysis is performed on the impact of the covert link on the target system at data-link layer. Finally, we analyze the performance of the target system at the transmission control protocol (TCP) layer which characterizes the end-to-end performance. The results of this research demonstrate the potential of this new method for hiding the transmission of information. The results of this research could encourage the creation of new protocols to protect these networks from exploitation of this manner.