no code implementations • 27 May 2020 • Hesham Mohammed, Dola Saha
We propose an end-to-end symmetric key neural encryption and decryption algorithm with a modulation technique, which remains undeciphered by an eavesdropper, equipped with the same neural network and trained on the same dataset as the intended users.
no code implementations • 30 Jan 2020 • Shuvam Chakraborty, Hesham Mohammed, Dola Saha
The last mile connection is dominated by wireless links where heterogeneous nodes share the limited and already crowded electromagnetic spectrum.
Networking and Internet Architecture Signal Processing