{"id":19,"date":"2020-01-14T15:10:13","date_gmt":"2020-01-14T15:10:13","guid":{"rendered":"http:\/\/wong.ece.ufl.edu\/?page_id=19"},"modified":"2020-01-14T15:10:13","modified_gmt":"2020-01-14T15:10:13","slug":"research","status":"publish","type":"page","link":"https:\/\/faculty.eng.ufl.edu\/wong\/research\/","title":{"rendered":"Current Research"},"content":{"rendered":"<h2>Dynamic Spectrum SHaring \/ Software-defined Radios<\/h2>\n<ul>\n<li><a href=\"http:\/\/teamgatorwings.com\">Team GatorWings<\/a>, Winner of the <a href=\"https:\/\/www.spectrumcollaborationchallenge.com\/\">DARPA Spectrum Collaboration Challenge<\/a>, 2017-2019.<\/li>\n<li>C. Bowyer, D. Greene, T. Ward, M. Menendez, J. Shea, and T. Wong, &#8220;<a class=\"gsc_vcd_title_link\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8935725\/\" data-clk=\"hl=en&amp;sa=T&amp;ei=EgkeXsPMEoKqmAHKgbuwBQ\">Reinforcement Learning for Mixed Cooperative\/Competitive Dynamic Spectrum Access<\/a>,&#8221; in <em>Proc. 2019 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN)<\/em>, Newark, NJ, Nov. 2019.<\/li>\n<li>T. F. Wong, T. Ward, J. M. Shea, M. Menendez, D. Greene, and C. Bowyer, &#8220;A Dynamic Spectrum Sharing Design in the DARPA Spectrum Collaboration Challenge,&#8221; GOMACTech 2020, San Diego, CA, Mar. 2020. To appear.<\/li>\n<li><a href=\"https:\/\/shannon.ece.ufl.edu:6528\/\">Digital Communications with SDRs<\/a>: A graduate-level course about practical digital communication techniques taught based on USRP radios<\/li>\n<\/ul>\n<h2><\/h2>\n<h2>Information StaBLE Partitioning<\/h2>\n<ul>\n<li>E. Graves and T. F. Wong, &#8220;<a class=\"gsc_vcd_title_link\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8844769\/\" data-clk=\"hl=en&amp;sa=T&amp;ei=3fUdXvPTI4KqmAHKgbuwBQ\">Inducing information stability to obtain information theoretic necessary requirements<\/a>,&#8221; <em>IEEE Transactions on Information Theory<\/em>, Sep. 2019.<\/li>\n<li>E. Graves and T. F. Wong, &#8220;<a class=\"gsc_vcd_title_link\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8437901\/\" data-clk=\"hl=en&amp;sa=T&amp;ei=GGkgXqPLCoKqmAHKgbuwBQ\">Transmitting arbitrary sources with finite error over a broadcast channel with confidential communications<\/a>,&#8221; in <em>Proc. 2018 IEEE International Symposium on Information Theory (ISIT),<\/em> pp. 921-925, June 2018.<\/li>\n<li>E. Graves and T. F. Wong, &#8220;<a class=\"gsc_vcd_title_link\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8006627\/\" data-clk=\"hl=en&amp;sa=T&amp;ei=N2YgXvpN-tKxAseXlRA\">Wiretap channel capacity: Secrecy criteria, strong converse, and phase change<\/a>,&#8221; in <em>Proc.\u00a02017 IEEE International Symposium on Information Theory (ISIT)<\/em>, pp. 744-748, June 2017.<\/li>\n<li>E. Graves and T. F. Wong, &#8220;<a class=\"gsc_vcd_title_link\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/7541773\/\" data-clk=\"hl=en&amp;sa=T&amp;ei=PmkgXq_sMYjamgHgir3YAg\">Information stabilization of images over discrete memoryless channels<\/a>,&#8221; in <em>Proc. 2016 IEEE International Symposium on Information Theory (ISIT)<\/em>, pp. 2619-2623, July 2016.<\/li>\n<li>E. Graves and T. F. Wong, &#8220;Equal-image-size source partitioning: Creating strong Fano&#8217;s inequalities for multi-terminal discrete memoryless channels,&#8221; <a href=\"http:\/\/arxiv.org\/pdf\/1512.00824v2.pdf\">arXiv:1512.00824<\/a>, 2015.<\/li>\n<li>E. Graves and T. F. Wong, &#8220;Equating the achievable exponent region to the achievable entropy region by partitioning the source,&#8221; in <em>Proc. 2014 IEEE Intern. Symp. Info. Theory (ISIT),<\/em> June 2014.<\/li>\n<\/ul>\n<h2><\/h2>\n<h2>Information Integrity<\/h2>\n<h4>Information transfer with guaranteed integrity<\/h4>\n<ul>\n<li>E. Graves and T. F. Wong, &#8220;Information integrity between correlated sources through Wyner-Ziv coding,&#8221; in Proc. 2015 IEEE Info. Theory Workshop, Jeju Island, Korea, Oct. 2015.<\/li>\n<li>E. Graves and T. F. Wong, &#8220;Information integrity in lossy source coding with side information,&#8221; in Proc. 52nd Annual Allerton Conference on Communication, Control, and Computing, pp. 1267-1271, Monticello, IL, Oct. 2014.<\/li>\n<li>E. Graves and T. F. Wong, &#8220;A coding approach to guarantee information integrity against a Byzantine relay,&#8221; IEEE ISIT, July 2013. Submission version available: <a href=\"http:\/\/arxiv.org\/pdf\/1302.0059v1.pdf\">arXiv:1302.0059<\/a> (a condition is missing from the theorem statement!)<\/li>\n<\/ul>\n<h4>Detectability of substitution attacks<\/h4>\n<ul>\n<li>R. Cao, T. F. Wong, T. Lv, H. Gao, and S. Yang, &#8220;<a class=\"gsc_vcd_title_link\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/7524729\/\" data-clk=\"hl=en&amp;sa=T&amp;ei=YP0dXtPmK_rSsQLHl5UQ\">Detecting Byzantine attacks without clean reference<\/a>,&#8221; <em>IEEE Transactions on Information Forensics and Security<\/em>, vol. 11, no. 12, pp. 2717 &#8211; 2731, Dec. 2016.<\/li>\n<li>R. Cao, E. Graves, T. F. Wong, and T. Lv, &#8220;Detecting Substitution Attacks Against Non-colluding Relays,&#8221; IEEE Globecom, Dec. 2013.<\/li>\n<li>E. Graves, B. Landers, D. Greene, and T. F. Wong, &#8220;<a href=\"http:\/\/ieeexplore.ieee.org\/xpl\/articleDetails.jsp?arnumber=6415779\">Certification codes for maliciousness detection in Physical-layer Network Coding<\/a>,&#8221; IEEE MILCOM, Oct. 2012.<\/li>\n<li>E. Graves and T. F. Wong, &#8220;Detectability of Symbol Manipulation by an Amplify-and-Forward Relay,&#8221; <a href=\"http:\/\/arxiv.org\/pdf\/1205.2681v2.pdf\">arXiv:1205.2681<\/a>, 2012.<\/li>\n<li>E. Graves and T. F. Wong, &#8220;<a href=\"http:\/\/ieeexplore.ieee.org\/xpl\/articleDetails.jsp?arnumber=6195821\">Detection of channel degradation attack by Intermediary Node in Linear Networks<\/a>,&#8221; IEEE INFOCOM, Mar. 2012.<\/li>\n<\/ul>\n<h2><\/h2>\n<h2>Secret Sharing\/ Key Agreement over Physical Channels<\/h2>\n<ul>\n<li>C. W. Wong, T. F. Wong, and J. M. Shea, &#8220;<a href=\"http:\/\/ieeexplore.ieee.org\/xpl\/articleDetails.jsp?arnumber=6127689\">An LDPC-based key-agreement scheme over the fast-fading wiretap channel<\/a>,&#8221; IEEE MILCOM, Nov. 2011.<\/li>\n<li>C. W. Wong, T. F. Wong, and J. M. Shea, &#8220;<a href=\"http:\/\/ieeexplore.ieee.org\/xpl\/articleDetails.jsp?arnumber=6162586\">LDPC code design for the BPSK-constrained Gaussian wiretap channel<\/a>,&#8221; IEEE Globecom Physical-Layer Security Workshop, Dec. 2011.<\/li>\n<li>C. W. Wong, T. F. Wong, and J. M. Shea, &#8220;<a href=\"http:\/\/ieeexplore.ieee.org\/xpl\/articleDetails.jsp?arnumber=5750045\">Secret sharing LDPC codes for the BPSK-constrained Gaussian wiretap channel<\/a>,&#8221; <em>IEEE Transactions on Information Forensics &amp; Security<\/em>, Special Issue on Using the Physical Layer for Securing the Next Generation of Communication Systems, vol. 6, no. 3, pp. 551-564, Sep. 2011. Submission version available: <a href=\"http:\/\/arxiv.org\/abs\/1009.3041\">arXiv:1009.3041<\/a><\/li>\n<li>T. F. Wong, M. Bloch, and J. M. Shea, &#8220;<a href=\"http:\/\/wireless.ece.ufl.edu\/twong\/Preprints\/eurasip.pdf\">Secret sharing over fast-fading MIMO wireless channels<\/a>,&#8221; <em>EURASIP Journal on Wireless Communications and Networking<\/em>, Special Issue on Wireless Physical Layer Security, Sep. 2009.<\/li>\n<li>C. W. Wong, E. Graves, J. M. Shea, and T. F. Wong, &#8220;<a href=\"http:\/\/ieeexplore.ieee.org\/xpl\/articleDetails.jsp?arnumber=5379753\">Secret sharing in fast fading channels using obfuscated incremental-redundancy hybrid ARQ<\/a>,&#8221; in Proceedings of the IEEE Military Communications Conference (MILCOM &#8217;09), Boston, MA, Oct. 2009.<\/li>\n<li>C. W. Wong, J. M. Shea, and T. F. Wong, &#8220;<a href=\"http:\/\/wireless.ece.ufl.edu\/twong\/Preprints\/4753216.pdf\">Secret Sharing in Fast Fading Channels based on Reliability-Based Hybrid ARQ<\/a>,&#8221; in Proceedings of the IEEE Military Communications Conference (MILCOM &#8217;08), San Diego, CA, Nov. 2008.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><a href=\"https:\/\/scholar.google.com\/citations?hl=en&amp;user=Jx7rgNYAAAAJ&amp;view_op=list_works&amp;sortby=pubdate\">GooGLE SCHOLAR &#8211; LIST of PUBLICATIONS<\/a><\/h2>\n","protected":false},"excerpt":{"rendered":"<p>Dynamic Spectrum SHaring \/ Software-defined Radios Team GatorWings, Winner of the DARPA Spectrum Collaboration Challenge, 2017-2019. C. Bowyer, D. Greene, T. Ward, M. Menendez, J. Shea, and T. Wong, &#8220;Reinforcement Learning for Mixed Cooperative\/Competitive Dynamic Spectrum Access,&#8221; in Proc. 2019 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), Newark, NJ, Nov. 2019. T. F. [&hellip;]<\/p>\n","protected":false},"author":1377,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/page-section-nav.php","meta":{"_acf_changed":false,"inline_featured_image":false,"featured_post":"","footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-19","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/faculty.eng.ufl.edu\/wong\/wp-json\/wp\/v2\/pages\/19","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/faculty.eng.ufl.edu\/wong\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/faculty.eng.ufl.edu\/wong\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/faculty.eng.ufl.edu\/wong\/wp-json\/wp\/v2\/users\/1377"}],"replies":[{"embeddable":true,"href":"https:\/\/faculty.eng.ufl.edu\/wong\/wp-json\/wp\/v2\/comments?post=19"}],"version-history":[{"count":0,"href":"https:\/\/faculty.eng.ufl.edu\/wong\/wp-json\/wp\/v2\/pages\/19\/revisions"}],"wp:attachment":[{"href":"https:\/\/faculty.eng.ufl.edu\/wong\/wp-json\/wp\/v2\/media?parent=19"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}