Skip to:
Wireless communication relies on radio frequency (RF) spectrum to transmit and receive signals. This RF spectrum is a limited and finite resource, creating challenges in supporting the ever-growing number of users in next-generation wireless networks. Spectrum sharing is one of the potential solutions to this problem, which maximizes spectrum utilization by either dynamically or statically allocating the same frequency bands to multiple users/services. However, this approach faces significant cybersecurity challenges, including the need to detect interference between the users, presence of anomalous users, and privacy concerns while sharing spectrum data. This project will familiarize undergraduate students to these challenges, help them in performing research to overcome these cybersecurity issues faced during shared spectrum management, and train them to conduct field experiments to validate their research/solutions.
The primary objective of this project is (i) to develop and evaluate machine learning (ML) algorithm that can detect interfering and anomalous users’ signals that fully/partially-overlap in time and frequency domains (ii) to use homomorphic encryption-based training of the ML algorithm for preserving privacy of users’ data. The methodology includes:
Students will develop the following research skills through this project: (i) reading and understanding research papers, (ii) designing experiments, (iii) collecting datasets, (iv) writing new codes and adapting existing codes as per requirement, (v) analyzing results, and (vi) writing technical papers. To help them in learning these skills, there will be weekly meetings to brainstorm ideas, discuss issues faced by students, the strategies to overcome these issues, and student presentations (at a later stage). This will ensure that the students will develop critical thinking and will be able to progress and complete the project in the stipulated amount of time. The project will help student in acquiring technical programming skills in Python/MATLAB for implementing privacy-preserving NN for detecting interference and anomalous RF transmissions in shared spectrum applications. The students will get a hands-on experience in using SDRs and the RF dataset collection APIs to transmit and receive RF signals. This will enable them to collect real-world datasets not just for this project, but also in their future projects. Students will also get familiarized with different representations of RF signals, e.g. spectrograms, power spectral densities, etc., which will enable them to visually understand how signals and their interference will look in the time-frequency domains. These skills will enable students to carry out research effectively.
In this project, the students will majorly contribute to developing interference and anomaly detection algorithm in shared spectrum use-cases while preserving privacy of users’ data used in these algorithms. The students will generate synthetic dataset as an initial start point, design algorithm using Alexnet NN, write code-base in Python for including homomorphic encryption-based training, analyzing results on synthetic dataset. After this, students will design a real-world experiment using SDRs and collect dataset for the interfering and anomaly signals in shared spectrum cases. Next, they will analyze results of the designed algorithm on real dataset, draw conclusions, present those results in meeting, and write research paper to wrap up the project. Throughout the project, students will comprehensively document each and every steps. The main advantage of this project is that it will develop experimental, technical, and analytical skills of the student. The hands-on experience in using SDRs to set up experiments involving RF communication signals can be used in any other project related to using ML in next-generation wireless communication networks. The student will primarily work independently on focused aspects of the project, such as algorithm development and data analysis, while also collaborating with other team members to ensure seamless integration into the overall project. Regular group meetings, facilitated through Microsoft Teams/Webex, will offer valuable opportunities for the student to enhance collaboration skills by engaging with peers in related research areas. This balanced approach enables the student to develop deep expertise in a specific area while broadening their technical knowledge through networking and teamwork.
Robotics, automation, and related Artificial Intelligence (AI) systems have become pervasive bringing in concerns related to security, safety, accuracy, and trust. These include robotic systems such as autonomous cars, medical robots, and recreational drones that operate in our households and workplaces. With growing dependency on physical robots that work in close proximity to humans, the security of these systems is becoming increasingly important to prevent cyber-attacks that could lead to privacy invasion, critical operations sabotage, and bodily harm. The current shortfall of professionals who can defend such systems demands development and integration of cybersecurity tools. This project will study current trends in robotic cybersecurity and train undergraduate students through the REU program to understand threats and vulnerabilities of AI robotic systems and perform research to defend against cyber-attacks on these systems
One specific topic on which an REU student would work on is adversarial attacks on vision-language navigation systems for robots. Research objectives include (i) perform a comparative evaluation of various prompt injection attacks on vision-language navigation systems (ii) evaluate the drop in performance of robot navigation systems as a result on adversarial attacks (iii) determine the effectiveness of defense strategies such as ensemble models on adversarial attacks. Students will use
state-of-the-art vision-language navigation systems available as open-source code such as NavGPT, LM-Nav, and VL-Map as a starting point for code development. Students will then implement various adversarial attacks such as prompt injection and adversarial inputs in addition to defense strategies such as ensemble models. Students will develop a hypothesis on the research objectives, design experiments to evaluate the hypotheses, write code and gather data to analyze the outcome of adversarial attacks as well as the effectiveness of defense strategies.
Students’ involvement in research activities will be focused on development of research skills such as experimental design, data analysis, and scientific writing. Experimental design and critical thinking skills will be taught and reinforced through weekly research discussions and brainstorming sessions. Scientific writing and communication skills will be honed through paper reading assignments, weekly presentations, and technical report writing. The research tasks assigned will allow the students to grow in technical abilities important in computer science research such as programming, package management, and data analysis. Students will be guided on using specific software tools such as ROS for robotic code development, PyTorch for deep learning, and Github for version control.
The REU students will mainly contribute to security algorithm design, data analysis, and development of a defense system for alleviating adversarial attacks on AI robotic systems. Roles and responsibilities include developing navigation models using Python and PyTorch on multiple platforms such as the Matterport 3D simulator and a physical Ghost Robotics Vision 60 unit. In addition, the students will use a test set to calculate overall algorithm performance metrics, including navigation error, success rate, and trajectory length. Even though students will mainly work independently on focused research thrusts, students will have the opportunity to develop collaboration skills through meetings with other students working on similar areas. Group meetings will be held on a regular basis and group work will be coordinated through Microsoft Teams. This allows students to acquire depth in a particular research area while maintaining breadth of technical knowledge by networking with peers.
Software-Defined Networking (SDN) is widely used in modern cloud, enterprise, and data-center networks due to its centralized control and programmability. While SDN enables flexible and efficient network management, it also introduces new security challenges, as attacks targeting the control plane or policy logic can rapidly propagate and destabilize the entire network. Traditional intrusion detection systems rely primarily on flow-level statistics and static mitigation rules, which are increasingly ineffective against adaptive and stealthy adversaries.
This project introduces undergraduate students to AI-assisted cybersecurity research by investigating how multimodal network telemetry and trustworthy AI techniques can be used to improve intrusion detection and decision making in SDN environments. Through hands-on experimentation, students will study how combining data-plane traffic, control-plane events, and SDN policy information can improve attack detection, robustness, and interpretability. The project emphasizes not only detecting attacks but also understanding why they occur and how networks can respond safely.
An REU student will focus on one or more of the following research objectives:
Students will formulate hypotheses, design experiments, analyze results, and document findings in a technical report or poster suitable for undergraduate research venues.
Through this project, students will develop:
Weekly mentoring meetings and group discussions will reinforce critical thinking and research ethics.
REU students will primarily contribute to:
Students will work independently on focused research tasks while participating in group meetings coordinated through Microsoft Teams, enabling collaboration and peer learning. This structure allows students to gain depth in SDN security research while developing teamwork and professional research skills.
Wireless networks are vulnerable to malicious devices that deliberately disrupt the shared communication medium; this is known as jamming. Over the past decade, jamming attacks have evolved from a mostly theoretical risk into a credible threat against wireless systems. Mitigating these attacks requires knowledge of wireless technology and standards, security threats, and algorithm analysis. This project directly addresses an important aspect of cybersecurity in emerging technologies by addressing the design of defenses with provable security guarantees against jamming.
This project focuses on evaluating the effectiveness of recent results on medium access control (MAC) algorithms that are designed to withstand jamming attacks in wireless networks. Utilizing MATLAB, the project involves setting up a simulated wireless network environment where different types of jamming attacks can be created and their impact on MAC algorithms can be evaluated. The REU students will learn several jamming-resistant MAC algorithms. Using MATLAB, the students will simulate a wireless network environment where they can implement and test various types of jamming strategies (i.e., constant, random, and reactive). Within this simulation, the students will implement the contention resolution algorithms. Data will be collected on key performance metrics, such as throughput, latency, packet delivery ratio, and collision rates. They will use statistical tools to analyze this data, looking to identify which algorithms are most effective at mitigating the impact of jamming. The culmination of their work will be a comprehensive report that details their methodologies, findings, and conclusions.
Students will develop a range of research skills. They will hone their abilities in experimental design by setting up and configuring simulations, allowing them to understand the impact of attacks on wireless communication. Data analysis skills will be enhanced as students learn to gather, process, and interpret large sets of data to evaluate the effectiveness of different algorithms, using statistical methods to discern patterns and outcomes. Students will also gain experience with scientific writing through the preparation of a project report that conveys the technical content in a clear and structured manner. Critical thinking will be emphasized as they must assess the results, theorize on the implications, and suggest improvements or new areas of study based on their findings. The students will also develop technical programming skills for scripting in simulation environments using MATLAB. This includes setting up and conducting network simulations, where they'll configure parameters, implement jamming scenarios, and analyze network behaviors. Additionally, students will gain expertise in statistical analysis by employing MATLAB and R to analyze data from their simulations. Skills in statistical testing and data visualization will be important for evaluating the effectiveness of various algorithms and describing the main findings. Finally, these findings will be presented in a document LaTeX for academic and technical reporting.
A primary objective of this project is to ensure that each student gains a comprehensive understanding across all relevant areas, including algorithm design, simulation of wireless communications, understanding of jamming strategies, data analysis, and technical writing. Students will be grouped to specialize in different aspects of jamming-resistant MAC algorithms, allowing them to delve deeply into specific algorithmic details. Additionally, as simulation designers, they will model wireless communications using an abstract time-slotted channel model that incorporates simple ternary feedback (indicating no transmission, a single transmission, or multiple transmissions) and established path loss effects. Different groups will explore and implement various path loss models to understand their impact on communication. Furthermore, each group will analyze the effectiveness of these algorithms using statistical methods, but individual students will take responsibility for analyzing and documenting the results for distinct jamming strategies and performance metrics. This structured approach ensures that while each student focuses on and is responsible for specific tasks, they also gain skills across a broad spectrum of the project’s scope.
As described above, students will work collaboratively in groups to explore different aspects of the project, such as algorithm design and simulation setup, and data analysis. Within these groups, individual students will take responsibility for specific tasks, like implementing different path loss models, analyzing distinct jamming strategies, and calculating performance metrics. Regular group meetings will facilitate the integration of individual work. This approach ensures that while students develop specialized skills independently, they also contribute to the overall project goals.
Connected vehicles and intelligent transportation infrastructure increasingly rely on continuous network connectivity to enable safety, efficiency, and automation. A critical and rapidly expanding component of this ecosystem is electric vehicle (EV) charging infrastructure, which integrates cyber-physical systems, backend cloud services, and vehicular communications. Unfortunately, this connectivity also introduces a broad attack surface. Compromised EV charging stations, roadside units, and vehicular communication links can be leveraged to disrupt transportation services, manipulate energy delivery, or launch large-scale cyberattacks.
Intrusion Detection Systems (IDS) play a central role in safeguarding connected vehicular and charging infrastructure. However, traditional IDS approaches often struggle in this domain due to high data rates, heterogeneous protocols, resource-constrained edge devices, and the tight coupling between cyber events and physical processes. This project directly addresses these challenges by investigating data-driven intrusion detection techniques for connected vehicles and EV charging infrastructure, with an emphasis on understanding attack behaviors, detection performance, and operational tradeoffs in realistic networked environments.
This project focuses on the design, implementation, and evaluation of IDSs for connected vehicles and EV charging infrastructure. Using simulation and data-driven analysis tools, students will model vehicular and charging network environments and study how cyberattacks manifest in network traffic and system behavior. Students will explore representative attack scenarios relevant to connected transportation systems, including denial-of-service attacks, spoofing, protocol abuse, and data manipulation targeting EV charging equipment and vehicle-to-infrastructure (V2I) communications. These attacks will be injected into simulated network environments that model interactions between vehicles, EV charging stations (EVSE), backend management systems, and supporting communication networks.
Within this environment, students will implement and evaluate intrusion detection techniques, including statistical anomaly detection and classical machine learning–based IDS methods. Key performance metrics, such as detection accuracy, false positive rate, detection latency, and computational overhead, will be collected and analyzed. Statistical tools will be used to compare the effectiveness of different IDS approaches under varying attack intensities, traffic conditions, and infrastructure configurations.
Students will develop a broad set of research and technical skills relevant to cybersecurity and intelligent transportation systems. They will gain experience in experimental design by constructing and configuring networked simulations that model realistic connected-vehicle and EV-charging environments. Through this process, students will develop an understanding of how cyber intrusions impact both network behavior and physical system operation. They will apply statistical analysis techniques to evaluate detection performance and identify trends across different attack and traffic scenarios. Programming skills will be developed through scripting and simulation, including implementing IDS algorithms, attack vectors, and performance evaluation pipelines.
Students will also gain experience in scientific and technical writing by preparing a structured project report using LaTeX, emphasizing clarity, rigor, and reproducibility. Critical thinking will be emphasized throughout the project as students interpret results, assess limitations of existing IDS approaches, and propose improvements or future research directions for securing connected vehicles and EV charging infrastructure.
A primary objective of this project is to ensure that each student gains a comprehensive understanding of intrusion detection in connected vehicular and charging environments, including network behavior, attack mechanisms, detection algorithms, and performance evaluation. As simulation designers, each student will independently model specific communication paths within the connected-vehicle and EV-charging ecosystem, such as vehicle-to-charger, charger-to-backend, and vehicle-to-infrastructure interactions. Using abstracted network and protocol representations, students will configure realistic traffic patterns, system constraints, and operational assumptions. By varying parameters such as traffic load, protocol behavior, and deployment scenarios, each student will assess how these factors influence intrusion detection performance in their assigned subsystem.
Each student will also assume primary responsibility for a well-defined research task, such as implementing a particular attack class, evaluating a specific IDS performance metric (e.g., detection latency or false positives), or analyzing the security behavior of a distinct component of the EV charging infrastructure.
Modern online platforms enable rumors, scams to spread quickly and at large scale, often exploiting human trust and attention. These attacks can trick users into clicking malicious links, sharing sensitive data, or propagating false alerts that create confusion and harm. This project will study how such information attacks spread through networks and develop defense strategies that help detect, explain, and contain them before they cause damage.
Students will build and analyze models of rumor spreading on social and communication networks, using graph and diffusion models to understand how malicious content travels. They will experiment with real or synthetic datasets that mimic phishing campaigns, scam messages, or coordinated rumor bursts, and design algorithms to flag suspicious patterns or high-risk propagation paths. Students will also investigate intervention mechanisms, such as warning signals, throttling strategies, or trusted-information injections, and evaluate how well these approaches slow or stop public information hacks.
Students are expected to attend weekly research meetings, maintain well-documented and reproducible code, and collaborate respectfully with other team members. Each student will take ownership of a focused subproblem. For example, building a rumor-spreading simulator, implementing a detection pipeline for phishing-style messages, or testing intervention strategies in simulated networks. By the end of the program, students will prepare a written report and public presentation that summarize their findings and reflect on the broader security and ethical implications of rumor spreading in everyday online environments.
Students are expected to attend weekly research meetings, maintain well-documented and reproducible code, and collaborate respectfully with other team members. Each student will take ownership of a focused subproblem. For example, building a rumor-spreading simulator, implementing a detection pipeline for phishing-style messages, or testing intervention strategies in simulated networks. By the end of the program, students will prepare a written report and public presentation that summarize their findings and reflect on the broader security and ethical implications of rumor spreading in everyday online environments.