Defense Notices


All students and faculty are welcome to attend the final defense of EECS graduate students completing their M.S. or Ph.D. degrees. Defense notices for M.S./Ph.D. presentations for this year and several previous years are listed below in reverse chronological order.

Students who are nearing the completion of their M.S./Ph.D. research should schedule their final defenses through the EECS graduate office at least THREE WEEKS PRIOR to their presentation date so that there is time to complete the degree requirements check, and post the presentation announcement online.

Upcoming Defense Notices

Md Mashfiq Rizvee

Hierarchical Probabilistic Architectures for Scalable Biometric and Electronic Authentication in Secure Surveillance Ecosystems

When & Where:


Eaton Hall, Room 2001B

Committee Members:

Sumaiya Shomaji, Chair
Tamzidul Hoque
David Johnson
Hongyang Sun
Alexandra Kondyli

Abstract

Secure and scalable authentication has become a primary requirement in modern digital ecosystems, where both human biometrics and electronic identities must be verified under noise, large population growth and resource constraints. Existing approaches often struggle to simultaneously provide storage efficiency, dynamic updates and strong authentication reliability. The proposed work advances a unified probabilistic framework based on Hierarchical Bloom Filter (HBF) architectures to address these limitations across biometric and hardware domains. The first contribution establishes the Dynamic Hierarchical Bloom Filter (DHBF) as a noise-tolerant and dynamically updatable authentication structure for large-scale biometrics. Unlike static Bloom-based systems that require reconstruction upon updates, DHBF supports enrollment, querying, insertion and deletion without structural rebuild. Experimental evaluation on 30,000 facial biometric templates demonstrates 100% enrollment and query accuracy, including robust acceptance of noisy biometric inputs while maintaining correct rejection of non-enrolled identities. These results validate that hierarchical probabilistic encoding can preserve both scalability and authentication reliability in practical deployments. Building on this foundation, Bio-BloomChain integrates DHBF into a blockchain-based smart contract framework to provide tamper-evident, privacy-preserving biometric lifecycle management. The system stores only hashed and non-invertible commitments on-chain while maintaining probabilistic verification logic within the contract layer. Large-scale evaluation again reports 100% enrollment, insertion, query and deletion accuracy across 30,000 templates, therefore, solving the existing problem of blockchains being able to authenticate noisy data. Moreover, the deployment analysis shows that execution on Polygon zkEVM reduces operational costs by several orders of magnitude compared to Ethereum, therefore, bringing enrollment and deletion costs below $0.001 per operation which demonstrate the feasibility of scalable blockchain biometric authentication in practice. Finally, the hierarchical probabilistic paradigm is extended to electronic hardware authentication through the Persistent Hierarchical Bloom Filter (PHBF). Applied to electronic fingerprints derived from physical unclonable functions (PUFs), PHBF demonstrates robust authentication under environmental variations such as temperature-induced noise. Experimental results show zero-error operation at the selected decision threshold and substantial system-level improvements as well as over 10^5 faster query processing and significantly reduced storage requirements compared to large scale tracking.


Fatima Al-Shaikhli

Optical Measurements Leveraging Coherent Fiber Optics Transceivers

When & Where:


Nichols Hall, Room 246 (Executive Conference Room)

Committee Members:

Rongqing Hui, Chair
Shannon Blunt
Shima Fardad
Alessandro Salandrino
Judy Wu

Abstract

Recent advancements in optical technology are invaluable in a variety of fields, extending far beyond high-speed communications. These innovations enable optical sensing, which plays a critical role across diverse applications, from medical diagnostics to infrastructure monitoring and automotive systems. This research focuses on leveraging commercially available coherent optical transceivers to develop novel measurement techniques to extract detailed information about optical fiber characteristics, as well as target information. Through this approach, we aim to enable accurate and fast assessments of fiber performance and integrity, while exploring the potential for utilizing existing optical communication networks to enhance fiber characterization capabilities. This goal is investigated through three distinct projects: (1) fiber type characterization based on intensity-modulated electrostriction response, (2) coherent Light Detection and Ranging (LiDAR) system for target range and velocity detection through different waveform design, including experimental validation of frequency modulation continuous wave (FMCW) implementations and theoretical analysis of orthogonal frequency division multiplexing (OFDM) based approaches and (3) birefringence measurements using a coherent Polarization-sensitive Optical Frequency Domain Reflectometer (P-OFDR) system.

Electrostriction in an optical fiber is introduced by interaction between the forward propagated optical signal and the acoustic standing waves in the radial direction resonating between the center of the core and the cladding circumference of the fiber. The response of electrostriction is dependent on fiber parameters, especially the mode field radius. We demonstrated a novel technique of identifying fiber types through the measurement of intensity modulation induced electrostriction response. As the spectral envelope of electrostriction induced propagation loss is anti-symmetrical, the signal to noise ratio can be significantly increased by subtracting the measured spectrum from its complex conjugate. We show that if the field distribution of the fiber propagation mode is Gaussian, the envelope of the electrostriction-induced loss spectrum closely follows a Maxwellian distribution whose shape can be specified by a single parameter determined by the mode field radius.        

We also present a self-homodyne FMCW LiDAR system based on a coherent receiver. By using the same linearly chirped waveform for both the LiDAR signal and the local oscillator, the self-homodyne coherent receiver performs frequency de-chirping directly in the photodiodes, significantly simplifying signal processing. As a result, the required receiver bandwidth is much lower than the chirping bandwidth of the signal. Simultaneous multi-target of range and velocity detection is demonstrated experimentally. Furthermore, we explore the use of commercially available coherent transceivers for joint communication and sensing using OFDM waveforms.

In addition, we demonstrate a P-OFDR system utilizing a digital coherent optical transceiver to generate a linear frequency chirp via carrier-suppressed single-sideband modulation. This method ensures linearity in chirping and phase continuity of the optical carrier. The coherent homodyne receiver, incorporating both polarization and phase diversity, recovers the state of polarization (SOP) of the backscattered optical signal along the fiber, mixing with an identically chirped local oscillator. With a spatial resolution of approximately 5 mm, a 26 GHz chirping bandwidth, and a 200 us measurement time, this system enables precise birefringence measurements. By employing three mutually orthogonal SOPs of the launched optical signal, we measure relative birefringence vectors along the fiber.


Past Defense Notices

Dates

YUFEI CHENG

Performance Analysis of Different Traffic Types in Mobile Ad-hoc Networks

When & Where:


246 Nichols Hall

Committee Members:

James Sterbenz, Chair
Fengjun Li
Gary Minden


Abstract

Mobile Ad Hoc networks~(MANETs) present great challenges to new protocol design, especially in scenarios where nodes are high mobile. Routing protocols performance is essential to the performance of wireless networks especially in mobile ad-hoc scenarios. The development of new routing protocols requires comparing them against well-known protocols in various simulation environments. Furthermore, application traffic like transactional application traffic has not been investigated for domain-specific MANETs scenarios. Overall, there are not enough performance comparison work in the past literatures. This thesis presents extensive performance comparison work with MANETs and uses inclusive parameter sets including both highly-dynamic environment as well as low-mobility cases.


EVAN AUSTIN

Theorem Provers as Libraries: An Approach to Formally Verifying Functional Programs

When & Where:


250 Nichols Hall

Committee Members:

Perry Alexander, Chair
Arvin Agah
Andy Gill
Prasad Kulkarni
Erik Van Vleck

Abstract

Property-directed verification of functional programs tends to take one of two paths. 
First, is the traditional testing approach, where properties are expressed in the original programming language and checked with a collection of test data. 
Tools following this technique have the advantage of a direct integration with the host system, but their resultant statement about a program's correctness is anything but a guarantee. 
Alternatively, for those desiring a more rigorous approach, properties can be written and checked with a formal tool; typically, an external proof system. 
This process delivers a well reasoned argument for a program's correctness, however, it comes at the cost of a more complex system integration requiring additional expertise. 

We propose a hybrid approach that captures the best of both worlds: the formality of a proof system paired with the native integration of an embedded, domain specific language for testing. 
Presented in this document is a description of the hybridization, a theorem prover as a library, as well as a classification of our target properties for case study. 
As we attempt to verify these properties, our goal is to document and formalize the logical connection between language and tool. 
The resultant process will be evaluated both for the strength of its reasoning power and its viability for real world application.


LEI SHI

Multichannel Sense-and-Avoid Radar for Small UAVs

When & Where:


2139 Learned Hall

Committee Members:

Chris Allen, Chair
Shannon Blunt
Ron Hui
Jim Stiles
Dongkyu Choi

Abstract

A multichannel sense-and-avoid radar system targeted for small unmanned aerial vehicles (UAVs), such as the 40% Yak-54 RC aircraft, is being developed to assist the integration of UAVs into the national air space. This frequency-modulated continuous-wave (FMCW) radar system utilizes a two-dimensional fast-Fourier transform process to detect targets in range and Doppler. Interferometry using a 5-element receiver array allows the radar to calculate the azimuth/elevation angles of the target relative to itself. These tasks are being performed in real time with a targeted update rate of 10 Hz utilizing highly-integrated radar-ready components and an FPGA based processor. The focus of the research is on analysis and enhancement of the radar performance by implementing various detection and predictive algorithms such as extended Kalman filtering and constant false alarm rate detection. By tracking targets and predicting their future location, false alarms caused by anomalies can be minimized. Furthermore, targets located at the same range and Doppler will corrupt each other’s signals during interferometic processing thus giving the autopilot corrupted angle information. Using a predictive algorithm these occurrences can be avoided with some level of confidence.


JUNYAN LI

Geo-Diversity Routing Protocol Implementation in ns-3

When & Where:


246 Nichols Hall

Committee Members:

James Sterbenz, Chair
Victor Frost
Bo Luo


Abstract

The path geo-diversity routing protocol described in this report takes advantage of geographical diversity of physical network topology, and quickens the routing selection. By importing this mechanism, a more accurate path could be provided instead of multiple useless attempts when area-based challenges occur in the network. A k-shortest path algorithm is introduced, followed by a modified algorithm. These two algorithms are implemented in ns-3, and tested in both grid network and real network. Simulation results show that they provide better performance compared to OSPF, as multiple geo-diverse paths are calculated to provide reliable performance.


NAJLA AHMAD

Intent Recognition in Multi-Agent Systems: Collective Box Pushing and Cow Herding

When & Where:


250 Nichols Hall

Committee Members:

Arvin Agah, Chair
Victor Frost
Jerzy Grzymala-Busse
Bo Luo
Sara Kieweg

Abstract

In a multi-agent system, an idle agent may be available to assist other agents in the system. An agent architecture called intent recognition is proposed to accomplish this with minimal communication. 
In order to assist other agents in the system, an agent performing recognition observes the tasks other agents are performing. Unlike the much studied field of plan recognition, the overall intent of an agent is recognized instead of a specific plan. The observing agent may use capabilities that it has not observed. This study focuses on the key research questions of: (1) What are intent recognition systems? (2) How can these be used in order to have agents autonomously assist each other effectively and efficiently? A conceptual framework is proposed for intent recognition systems. An implementation of the conceptual framework is tested and evaluated. We hypothesize that using intent recognition in a multi-agent system increases utility (where utility is domain specific) and decreases the amount of communication. We test our hypotheses using two experimental series in the domains of Box Pushing, where agents attempt to push boxes to specified locations; and Cow Herding, where agents attempt to herd cow agents into team corrals. A set of metrics, including task time and number of communications, is used to compare the performance of plan recognition and intent recognition. In both sets of experimental series, intent recognition agents communicate fewer times than plan recognition agents. In addition, unlike plan recognition, when agents use the novel approach of intent recognition, they select unobserved actions to perform, which was seen in both experimental series. Intent recognition agents were also able to outperform plan recognition agents by sometimes reducing task completion time in the Box Pushing domain and consistently scoring more points in the Cow Herding domain.


JUSTIN METCALF

Signal Processing for Non-Gaussian Statistics: Clutter Distribution Identification and Adaptive Threshold Estimation

When & Where:


129 Nichols

Committee Members:

Shannon Blunt, Chair
Luke Huan
Lingjia Liu
Jim Stiles
Tyrone Duncan

Abstract

We examine the problem of determining a decision threshold for the binary hypothesis test that naturally arises when a radar system must decide if there is a target present in a range cell under test. Modern radar systems require predictable, low, constant rates of false alarm (i.e. when unwanted noise and clutter returns are mistaken for a target). Measured clutter returns have often been fitted to heavy tailed, non-Gaussian distributions. The heavy tails on these distributions cause an unacceptable rise in the number of false alarms. We use the class of spherically invariant random vectors (SIRVs) to model clutter returns. SIRVs arise from a phenomenological consideration of the radar sensing problem, and include both the Gaussian distribution and most commonly reported non-Gaussian clutter distributions (e.g. K distribution, Weibull distribution). We propose an extension of a prior technique called the Ozturk algorithm. The Ozturk algorithm generates a graphical library of points corresponding to known SIRV distributions. These points are generated from linked vectors whose magnitude is derived from the order statistics of the SIRV distributions. Measured data is then compared to the library and a distribution is chosen that best approximates the measured data. Our extension introduces a framework of weighting functions and adaptively scaling of the measured data. Further, we extend the Ozturk algorithm to both a distribution classi fication technique as well as a method of determining an adaptive threshold in data that may not belong to a known distribution. Special attention is paid to producing a robust, adaptive estimation of the detection threshold.


EGEMEN CETINKAYA

Modelling and Design of Resilient Networks under Challenges

When & Where:


246 Nichols Hall

Committee Members:

James Sterbenz, Chair
Victor Frost
Bo Luo
Gary Minden
Tyrone Duncan

Abstract

Communication networks, in particular the Internet, face a variety of challenges that can disrupt our daily lives resulting in the loss of human lives and significant financial costs in the worst cases. We define challenges as external events that trigger faults that eventually result in service failures. Understanding these challenges accordingly is essential for improvement of the current networks and for designing Future Internet architectures. This dissertation presents a taxonomy of challenges that can help evaluate design choices for the current and Future Internet. Graph models to analyse critical infrastructures are examined and a multilevel graph model is developed to study interdependencies between different networks. Furthermore, graph-theoretic heuristic optimisation algorithms are developed. These heuristic algorithms add links to increase the resilience of networks in the least costly manner and they are computationally less expensive than an exhaustive search algorithm. The performance of networks under random failures, targeted attacks, and correlated area-based challenges are evaluated by the challenge simulation module that we developed. The GpENI Future Internet testbed is used to conduct experiments to evaluate the performance of the heuristic algorithms developed.


AQSA PATEL

Interpretation of SIRAL Waveforms using Ultra-wideband Radar Altimeter Data

When & Where:


317 Nichols Hall

Committee Members:

Carl Leuschen, Chair
Swapan Chakrabarti
Prasad Gogineni
John Paden
David Braaten

Abstract

The surface-elevation of ice sheets and sea ice is currently measured using both satellite and airborne radar altimeters. These measurements are used for generating mass balance estimates of ice sheets and thickness estimates of sea ice. However, due to the penetration of the altimeter signal into the snow there is ambiguity between the surface tracking point and the actual surface location which produces errors in the surface elevation measurement. Until now there is no comprehensive study done to address how the penetration of the Ku-band signal affects the shape of the return signal over various snow zones and sea ice. Therefore, it is important to study the effect sub-surface scattering and seasonal variations in the properties of snow pack have on the return waveform to correctly interpret the satellite radar altimeter data. To address this problem, an ultra-wide bandwidth Ku-band radar altimeter was developed at the Center for Remote Sensing of Ice Sheets (CReSIS). The CReSIS Ku-band Altimeter (CKA) operates over the frequency range of 12 to 18 GHz providing very fine resolution to resolve the sub-surface features of the snow. The CKA is design to encompass the frequency band of SIRAL, a satellite radar altimeter on board CryoSat-2, operating from 13.4 to 13.75 GHz. The data from CKA can be used to simulate SIRAL data, and the simulated SIRAL waveforms can help us understand the effect of signal penetration and sub-surface scattering on the low bandwidth satellite altimeter. The extensive CKA data collected as a part of the Operation Ice Bridge (OIB) campaign can be used to interpret SIRAL data over surfaces with varying snow conditions. The goal of this research is to use modeling and data inter-comparisons from CKA and satellite measurements to investigate the effect of signal penetration into snow and geophysical snow conditions on the retrieval of surface elevation from satellite radar altimeters, such as SIRAL. Based on the results of this investigation, the plan is to improve the tracking algorithms used by SIRAL to effectively track the actual surface location accurately.


MEEYOUNG PARK

HealthTrust: Assessing the Trustworthiness of Healthcare Information on the Internet

When & Where:


250 Nichols Hall

Committee Members:

Bo Luo, Chair
Xue-Wen Chen
Arvin Agah
Luke Huan
Michael Wang

Abstract

As well recognized, healthcare information is growing exponentially and is made more available to public. Frequent users such as medical professionals and patients are highly dependent on the web sources to get the appropriate information promptly. However, the trustworthiness of the web information can be hardly discriminated due to the fast and augmentative properties of the Internet. Most search engines provide relevant pages to given keywords, but the results might contain unreliable or biased information. 

In this dissertation, I proposed a new system named HealthTrust, which automatically assesses the trustworthiness of healthcare information over the Internet. First, in the first phase, a new ranking algorithm for structure-based analysis is adopted. The basic hypothesis is that trustworthy pages are more likely to link to trustworthy pages. In this way, the original set of positive and negative seeds will propagate over the Web graph. Next, in the second phase, the content-consistency between general healthcare-related webpages and trusted sites is evaluated using information retrieval techniques to evaluate the context of the webpage. In addition, sentence modeling is employed to generate contents-based ranking for each page. Finally, an iterative algorithm is developed to integrate the two components.


STEVE PENNINGTON

Spectrum Coverage Estimation Using Large Scale Measurements

When & Where:


246 Nichols Hall

Committee Members:

Joe Evans, Chair
Arvin Agah
Victor Frost
Gary Minden
Ronald Aust

Abstract

Existing RF path loss models are useful for prediction but do not necessarily exploit additional knowledge such as differing terrain features. This research will examine the relationship between terrain type (determined by public GIS data sets) and empirical path loss model parameters through the use of a large scale data collection platform. A large scale measurement campaign will be undertaken to sample the UHF DTV bands from a variety of environments using a set of portable software defined radio sensors. Machine learning and geostatistical algorithms will then be used to learn path loss parameters for generalized terrain types.