Selected Publications
Book
Y. Thomas Hou, Yi Shi, and Hanif D. Sherali, Applied Optimization Methods for Wireless Networks, Cambridge University Press, 2014. ISBN: 9781139088466.
Patents
Y.E. Sagduyu, T. Erpek, Y. Shi, and S. Ponnaluri, “Distributed network control and link activation for multi-user MIMO communication”, US Patent 11,705,943.
Y.E. Sagduyu, J. Li, Y. Shi, A. Grushin, and Z. El-Jamous, "Systems and means for generating synthetic social media data", US Patent 10,719,779.
Y.E. Sagduyu, Z. El-Jamous, M. Ding, V. Manikonda, and Y. Shi, "Systems and means for detecting automated programs used to generate social media input", US Patent 11,005,843.
Selected Book Chapters
Y.E. Sagduyu, Y. Shi, T. Erpek, W. Headley, B. Flowers, G. Stantchev, Z. Lu, and B. Jalaian, “Adversarial machine learning: A new threat paradigm for next-generation wireless communications,” in AI, Machine Learning and Deep Learning: A Security Perspective, edited by F. Hu, X. Hei, CRC Press, pp. 35–52, June 2023.
Y.E. Sagduyu, T. Erpek, and Y. Shi, “Adversarial machine learning for 5G communications security,” to appear in Game Theory and Machine Learning for Cyber Security, edited by C.A. Kamhoua, C.D. Kiekintveld, F. Fang, Q. Zhu, pp. 270–288, New York, NY, Wiley Publisher, September 2021.
Selected Journal papers
Canming Jiang, Yi Shi, Y. Thomas Hou, and Sastry Kompella, "Bicriteria optimization in multi-hop wireless networks: Characterizing the throughput-energy envelope," IEEE Transactions on Mobile Computing, vol. 12, issue 8, pp. 1866-1878, September 2013. (Selected as the Spotlight Paper for the September 2013 issue).
P. Lohan, B. Kantarci, M.A. Ferrag, N. Tihanyi, Y. Shi, “From 5G to 6G Networks, a Survey on AI-Based Jamming and Interference Detection and Mitigation,” to appear in IEEE Open Journal of the Communications Society.
N. Jai, Y. Shi, S. Li, C. Li, Y.T. Hou, W. Lou, J.H. Reed, M. Olfat, S. Kompella, L. DaSilva, “Modeling and optimization of channel allocation for PAL and GAA users in the CBRS band,” IEEE Transactions on Cognitive Communications and Networking, vol. 10, no. 1, February 2024.
Y. Shi, P. Rahimzadeh, M. Costa, T. Erpek, and Y.E. Sagduyu, “Deep reinforcement learning for NextG radio access network slicing with spectrum coexistence,” IEEE Networking Letters Special Issue on Network Enablers for 6G Use Cases, vol. 5, pp. 149–153, September 2023.
Y. Shi and Y.E. Sagduyu, "Membership inference attack and defense for wireless signal classifiers with deep learning," IEEE Transactions on Mobile Computing, vol. 22, pp. 4032–4043, July 2023.
Y. Shi, Y.E. Sagduyu, T. Erpek, and M.C. Gursoy, “How to attack and defend 5G radio access network slicing with reinforcement learning,” IEEE Open Journal of Vehicular Technology, Special Issue - Recent Advances in Security and Privacy for 6G Networks, vol. 4, pp. 181–192, December 2022.
Selected Conference papers:
Yi Shi, Liguang Xie, Y. Thomas Hou, and Hanif D. Sherali, "On renewable sensor networks with wireless energy transfer," in Proc. IEEE INFOCOM, pp. 1350-1358, Shanghai, China, April 10-15, 2011. (2023 INFOCOM Test of Time Paper Award).
Yi Shi and Y. Thomas Hou, "Theoretical results on base station movement problem for sensor network," in Proc. IEEE INFOCOM, pp. 376-384, Phoenix, AZ, April 14-17, 2008. (Best Paper Award).
Yi Shi, Jia Liu, Canming Jiang, Cunhao Gao, and Y. Thomas Hou, "An optimal link layer model for multi-hop MIMO networks," in Proc. IEEE INFOCOM, pp. 1916-1924, Shanghai, China, April 10-15, 2011. (The only Best Paper Award Runner-Up).
Y. Shi, Y.E. Sagduyu, K. Davaslioglu, and J.H. Li, "Active deep learning attacks under strict rate limitations for online API calls," in Proceedings of IEEE International Symposium on Technologies for Homeland Security (HST), 6 pages, Crystal City, VA, May 2-3, 2018. (Best Paper Award).
Huacheng Zeng, Y. Thomas Hou, Yi Shi, Wenjing Lou, Sastry Kompella, and Scott F. Midkiff, "Shark-IA: An interference alignment algorithm for multi-hop underwater acoustic networks with large propagation delays," in Proc. ACM International Conference on Underwater Networks & Systems (WUWNet), article 6, Rome, Italy, November 12-14, 2014. (Best Student Paper Award).
S. Shi, Y. Xiao, C. Du, Y. Shi, C. Wang, R. Gazda, Y.T. Hou, E. Burger, L. DaSilva, W. Lou, “TriSAS: Toward dependable inter-SAS coordination with auditability,” to appear in ACM ASIA Conference on Computer and Communications Security (ASIACCS), Singapore, July 1–5, 2024.
N. Jai, Y. Shi, M. Olfat, J. Reed, L. DaSilva, W. Lou, and Y.T. Hou, “An optimized move list for DPA in CBRS,” in Proceedings of IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), Washington, DC, May 13–16, 2024.
H. Yu, S. Shi, Y. Shi, E.W. Burger, Y.T. Hou, and W. Lou, “Pri-Share: Enabling inter-SAS privacy protection via secure multi-party spectrum allocation,” in Proceedings of IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), Washington, DC, May 13–16, 2024.
Y.E. Sagduyu, T. Erpek and Y. Shi, “Securing NextG systems against poisoning attacks on federated learning: A game-theoretic solution,” in Proceedings of IEEE Military Communications Conference (MILCOM), pp. 815–820, Boston, MA, October 30–November 3, 2023.
Y. Shi, Y.E. Sagduyu, and T. Erpek, “Jamming attacks on decentralized federated learning in general multi-hop wireless networks,” in Proceedings of IEEE INFOCOM Workshop on 5G and Beyond Wireless Security (Wireless-Sec), 6 pages, Hoboken, NJ, May 20, 2023.
Y. Shi and Y.E. Sagduyu, “How to launch jamming attacks on federated learning in NextG wireless networks,” in Proceedings of IEEE Globecom Workshop on 5G and Beyond Wireless Security (Wireless-Sec), pp. 945–950, Rio de Janeiro, Brazil, December 4–8, 2022.
Y. Shi, M. Mehedint, T. Nguyen, and H. Zeng, “Vulnerability analysis for deep learning systems in network security,” in Proceedings of IEEE Military Communications Conference (Milcom), Restricted Program, Rockville, MD, November 28–December 2, 2022.
Y. Shi and Y.E. Sagduyu, “Sensing-throughput tradeoffs with generative adversarial networks for NextG spectrum sharing,” in Proceedings of IEEE Milcom Workshop on 5G Military Communications: Open Modular Architectures, Testbeds, and Cybersecurity, pp. 13–18, Rockville, MD, November 28, 2022.
Y. Shi, Y.E. Sagduyu, T. Erpek, and M.C. Gursoy, “Jamming attacks on NextG radio access network slicing with reinforcement learning,” in Proceedings of IEEE Future Networks World Forum (FNWF), pp. 397–402, Montreal, Canada, October 12–14, 2022.
M. Hegarty, Y.E. Sagduyu, T. Erpek, and Y. Shi, “Deep learning for spectrum awareness and covert communications via unintended RF emanations,” in Proceedings of ACM WiSec Workshop on Wireless Security and Machine Learning (WiseML), pp. 27–32, San Antonio, TX, May 19, 2022.
Y. Shi, Y.E. Sagduyu, and T. Erpek, “Federated learning for distributed spectrum sensing in NextG communication networks,” in SPIE Defense + Commercial Sensing, Orlando, vol. 12113, pp. 472–478, Orlando, FL, April 3–7, 2022.
Last updated: June 19, 2024