Department of Electrical and Computer Engineering A NONPARAMETRIC BAYESIAN FRAMEWORK FOR MOBILE DEVICE SECURITY AND LOCATION BASED SERVICES Nam Tuan Nguyen.

Slides:



Advertisements
Similar presentations
Applications of one-class classification
Advertisements

The Helmholtz Machine P Dayan, GE Hinton, RM Neal, RS Zemel
Unsupervised Learning
Bayesian Nonparametric Classification and Applications
D EFENSE A GAINST S PECTRUM S ENSING D ATA F ALSIFICATION A TTACKS I N C OGNITIVE R ADIO N ETWORKS Li Xiao Department of Computer Science & Engineering.
SELECT: Self-Learning Collision Avoidance for Wireless Networks Chun-Cheng Chen, Eunsoo, Seo, Hwangnam Kim, and Haiyun Luo Department of Computer Science,
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
What is Statistical Modeling
1 Prediction-based Strategies for Energy Saving in Object Tracking Sensor Networks Yingqi Xu, Wang-Chien Lee Proceedings of the 2004 IEEE International.
Modeling Pixel Process with Scale Invariant Local Patterns for Background Subtraction in Complex Scenes (CVPR’10) Shengcai Liao, Guoying Zhao, Vili Kellokumpu,
Volkan Cevher, Marco F. Duarte, and Richard G. Baraniuk European Signal Processing Conference 2008.
Department of Electrical and Computer Engineering Case Study of Big Data Analysis for Smart Grid Department of Electrical and Computer Engineering Zhu.
Deep Belief Networks for Spam Filtering
Remote Sensing Laboratory Dept. of Information Engineering and Computer Science University of Trento Via Sommarive, 14, I Povo, Trento, Italy Remote.
A FREQUENCY HOPPING SPREAD SPECTRUM TRANSMISSION SCHEME FOR UNCOORDINATED COGNITIVE RADIOS Xiaohua (Edward) Li and Juite Hwu Department of Electrical and.
Data Selection In Ad-Hoc Wireless Sensor Networks Olawoye Oyeyele 11/24/2003.
EE513 Audio Signals and Systems Statistical Pattern Classification Kevin D. Donohue Electrical and Computer Engineering University of Kentucky.
Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho Communications.
Context Awareness System and Service SCENE JS Lee 1 Energy-Efficient Rate-Adaptive GPS-based Positioning for Smartphones.
Cooperative spectrum sensing in cognitive radio Aminmohammad Roozgard.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
Extracting Places and Activities from GPS Traces Using Hierarchical Conditional Random Fields Yong-Joong Kim Dept. of Computer Science Yonsei.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Alignment and classification of time series gene expression in clinical studies Tien-ho Lin, Naftali Kaminski and Ziv Bar-Joseph.
Prakash Chockalingam Clemson University Non-Rigid Multi-Modal Object Tracking Using Gaussian Mixture Models Committee Members Dr Stan Birchfield (chair)
POWER CONTROL IN COGNITIVE RADIO SYSTEMS BASED ON SPECTRUM SENSING SIDE INFORMATION Karama Hamdi, Wei Zhang, and Khaled Ben Letaief The Hong Kong University.
System Identification of Nonlinear State-Space Battery Models
A General Framework for Tracking Multiple People from a Moving Camera
Chih-Ming Chen, Student Member, IEEE, Ying-ping Chen, Member, IEEE, Tzu-Ching Shen, and John K. Zao, Senior Member, IEEE Evolutionary Computation (CEC),
A Survey of Spectrum Sensing Algorithm for Cognitive Radio Applications YaGun Wu netlab.
Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Yingzhe Li, Xinbing Wang, Xiaohua Tian Department of Electronic Engineering.
1 Blind Channel Identification and Equalization in Dense Wireless Sensor Networks with Distributed Transmissions Xiaohua (Edward) Li Department of Electrical.
1 Service Charge and Energy- Aware Vertical Handoff in Integrated IEEE e/ Networks Youngkyu Choi and Sunghyun Choi School of Electrical Engineering.
Bounded relay hop mobile data gathering in wireless sensor networks
X. Li, W. LiuICC May 11, 2003A Joint Layer Design Smart Contention Resolution Random Access Wireless Networks With Unknown Multiple Users: A Joint.
Probabilistic Models for Discovering E-Communities Ding Zhou, Eren Manavoglu, Jia Li, C. Lee Giles, Hongyuan Zha The Pennsylvania State University WWW.
A Trust Based Distributed Kalman Filtering Approach for Mode Estimation in Power Systems Tao Jiang, Ion Matei and John S. Baras Institute for Systems Research.
Dr. Sudharman K. Jayaweera and Amila Kariyapperuma ECE Department University of New Mexico Ankur Sharma Department of ECE Indian Institute of Technology,
Cognitive Radio: Next Generation Communication System
Performance Evaluation of Mobile Hotspots in Densely Deployed WLAN Environments Presented by Li Wen Fang Personal Indoor and Mobile Radio Communications.
Lecture 2: Statistical learning primer for biologists
Unsupervised Mining of Statistical Temporal Structures in Video Liu ze yuan May 15,2011.
Spectrum Sensing In Cognitive Radio Networks
Week Aug-24 – Aug-29 Introduction to Spatial Computing CSE 5ISC Some slides adapted from the book Computing with Spatial Trajectories, Yu Zheng and Xiaofang.
I Am the Antenna Accurate Outdoor AP Location Using Smartphones Zengbin Zhang†, Xia Zhou†, Weile Zhang†§, Yuanyang Zhang†, Gang Wang†, Ben Y. Zhao† and.
Cognitive models for emotion recognition: Big Data and Deep Learning
1 Chapter 8: Model Inference and Averaging Presented by Hui Fang.
Discriminative Training and Machine Learning Approaches Machine Learning Lab, Dept. of CSIE, NCKU Chih-Pin Liao.
Dejavu:An accurate Energy-Efficient Outdoor Localization System SIGSPATIAL '13.
CHANNEL ALLOCATION FOR SMOOTH VIDEO DELIVERY OVER COGNITIVE RADIO NETWORKS Globecom 2010, FL, USA 1 Sanying Li, Tom H. Luan, Xuemin (Sherman) Shen Department.
An Energy-Efficient Approach for Real-Time Tracking of Moving Objects in Multi-Level Sensor Networks Vincent S. Tseng, Eric H. C. Lu, & Kawuu W. Lin Institute.
Optimal Relay Placement for Indoor Sensor Networks Cuiyao Xue †, Yanmin Zhu †, Lei Ni †, Minglu Li †, Bo Li ‡ † Shanghai Jiao Tong University ‡ HK University.
FD-MMAC: Combating Multi-channel Hidden and Exposed Terminals Using a Single Transceiver Yan Zhang, Loukas Lazos, Kai Chen, Bocan Hu, and Swetha Shivaramaiah.
1 Spectrum Co-existence of IEEE b and a Networks using the CSCC Etiquette Protocol Xiangpeng Jing and Dipankar Raychaudhuri, WINLAB Rutgers.
Energy Efficient Detection of Compromised Nodes in Wireless Sensor Networks Haengrae Cho Department of Computer Engineering, Yeungnam University Gyungbuk.
SUPERVISED AND UNSUPERVISED LEARNING Presentation by Ege Saygıner CENG 784.
Ashish Rauniyar, Soo Young Shin IT Convergence Engineering
Mohsen Riahi Manesh and Dr. Naima Kaabouch
Online Multiscale Dynamic Topic Models
Zhu Han University of Houston Thanks for Dr. Nam Nguyen Work
Restricted Boltzmann Machines for Classification
Multimodal Learning with Deep Boltzmann Machines
PERFORMANCE ANALYSIS OF SPECTRUM SENSING USING COGNITIVE RADIO
Subway Station Real-time Indoor Positioning System for Cell Phones
Presented by Prashant Duhoon
AirPlace Indoor Positioning Platform for Android Smartphones
Course Outline MODEL INFORMATION COMPLETE INCOMPLETE
A survey of network anomaly detection techniques
Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation Binghui Wang, Jinyuan Jia, and Neil.
GANG: Detecting Fraudulent Users in OSNs
Presentation transcript:

Department of Electrical and Computer Engineering A NONPARAMETRIC BAYESIAN FRAMEWORK FOR MOBILE DEVICE SECURITY AND LOCATION BASED SERVICES Nam Tuan Nguyen Advisors: Dr. Zhu Han and Dr. Rong Zheng. ECE Dept., University of Houston, USA. Dissertation Defense

Department of Electrical and Computer Engineering Defense outlines Introduction. – Security for wireless network and contributions. – Location based services for wireless devices and contributions. Preliminary: Nonparametric classification techniques. Security for wireless devices. – Masquerade attack and Sybil attack. Location based services. – LOIRE: Indoor place identification. – Prediction: Dynamic Hidden Markov Model. – Prediction: Deep Learning. Conclusion and future work. 2

Department of Electrical and Computer Engineering Presentation outlines Introduction. – Security for wireless network and contributions. – Location based services for wireless devices and contributions. Nonparametric classification techniques. Security for wireless devices. – Masquerade attack and Sybil attack. Location based services. – LOIRE – Dynamic Hidden Markov Model – Deep Learning Conclusion and future work. 3

Department of Electrical and Computer Engineering Security Enhancement for Wireless Network Use device dependent radio-metrics as fingerprints. Contributions: – Unique and hard-to-spoof device fingerprint – An unsupervised and passive attack detection method. – Upper bound and lower bound of classification performance. Introduction: Security 4 Department of Electrical and Computer Engineering Masquerade attack Sybil attack

Department of Electrical and Computer Engineering Introduction: Location Based Service (LBS) 5

Department of Electrical and Computer Engineering Introduction: LBS Major tasks to enable LBS: – Localize. – Estimate dwelling time. – Prediction: Where to go next? 6

Department of Electrical and Computer Engineering Introduction: LBS Contributions: – Development of the complete framework, from localizing users, to predicting future whereabouts. – Incomplete data handling. – Online classification technique. – Profiling free. – Using experimental data to validate the performance. – Novel dynamic hidden Markov model. – Using Deep Learning to predict future locations. 7

Department of Electrical and Computer Engineering Presentation outlines Introduction. – Security for wireless network and contributions. – Location based services for wireless devices and contributions. Preliminary: Nonparametric classification techniques. Security for wireless devices. – Masquerade attack and Sybil attack. Location based services. – LOIRE – Dynamic Hidden Markov Model – Deep Learning Conclusion and future work. 8

Department of Electrical and Computer Engineering Preliminary: Nonparametric classification Nonparametric: – Either no assumption about the distributions is made. – Or no prior information about the number of classes is given. Goal: 9

Department of Electrical and Computer Engineering Nonparametric classification: IGMM Infinite Gaussian mixture model: Generative model. Stick(α) Infinite number of faces/classes ∞ 7 π1π1 π2π2 π∞π∞ The observations follows a distribution such as Gaussian. µ∞Σ∞µ∞Σ∞ µ1Σ1µ1Σ1 µ2Σ2µ2Σ2 Indicators are created according to multinomial distribution. z 1, z 2.. = 1 z 20, z 21.. = 2 X 1:N 10

Department of Electrical and Computer Engineering Nonparametric classification: IGMM ? ? IGMM inference model: Chinese restaurant process (1) (2) 11

Department of Electrical and Computer Engineering Nonparametric classification: Mean shift Density estimation: The gradient of the density: Move toward the densest region of the observations, i.e., the region with 0 gradient. 12

Department of Electrical and Computer Engineering Presentation outlines Introduction. – Security for wireless network and contributions. – Location based services for wireless devices and contributions. Nonparametric classification techniques. Security for wireless devices. – Masquerade attack and Sybil attack. Location based services. – LOIRE – Dynamic Hidden Markov Model – Deep Learning Conclusion and future work. 13

Department of Electrical and Computer Engineering Wireless device security Mechanism: – If the number of devices can be found, compare that number to the number of associated devices to detect an attack. – Based on the label of the observations generated from the devices to mark the malicious nodes. Device1 00-B0-D0-86-BB-F7 Device2 00-0C-F AD Device3 00-0C-F AD Masquerade attack Device1 00-B0-D0-86-BB-F7 00-0C-F AD Device2 00-A0-C9-14-C8-29 Sybil attack 14

Department of Electrical and Computer Engineering Security – Features selection The Carrier Frequency Difference (CFD) – Defined as the difference between the carrier frequency of the ideal signal and that of the transmitted signal. – Depends on the oscillator within each device. The Phase Shift Difference (PSD) – Using QPSK modulation technique. – Transmitter amplifiers for I-phase and Q- phase might be different. Consequently, the degree shift can have some variances. 15

Department of Electrical and Computer Engineering Security – Features selection The Second- Order Cyclostationary Feature (SOCF) The Received Signal Amplitude Autocorrelation 16 BPSK Spectral coherence Spectral coherence Cycle frequency Frequency

Department of Electrical and Computer Engineering Security – Gibbs sampler Start with random indicator for each observation. Update the indicator z i according to (1) and (2) given all the other indicators Converge? Yes No STOP Remove the current i th observation from its cluster 17

Department of Electrical and Computer Engineering Security – Inference Algorithm 18 Collect data Unsupervised clustering method Two clusters with the same MAC addresses? Two MAC address with the same cluster? Masquerade attack. Sybil attack. Determine the number of attackers Update the “black” list with the Mac address Yes No Yes

Department of Electrical and Computer Engineering Security - Evaluation 19 IGMM MS I Am Na m Jul y IGMM MS Upper bound Lower bound Hit rate in detecting the number of devices Hit rate (%) KLD Hit rate (%) KLD

Department of Electrical and Computer Engineering Security - Evaluation 20 Simulation results of IGMM – Kullback Leibler Distance = 4.5 Use USRP2 to collect experimental data Only two dimensions are displayed for the demonstration purpose. Almost 100% in identifying an attack.

Department of Electrical and Computer Engineering Presentation outlines Introduction. – Security for wireless network and contributions. – Location based services for wireless devices and contributions. Nonparametric classification techniques. Security for wireless devices. – Masquerade attack and Sybil attack. Location based services. – LOIRE – Dynamic Hidden Markov Model – Deep Learning Conclusion and future work. 21

Department of Electrical and Computer Engineering LBS – Problem statements What’s given: – Mobile devices are in indoor environments. – WiFi scans. Goals: – Identifying revisited location. – Automatically profiling new location. – Unsupervised approach. No labeling required. – Online sampling to reduce the complexity. – Predicting the next possible locations. 22

Department of Electrical and Computer Engineering LBS – Current indoor localization solutions Ngram: – Based on the order of the APs. – Need at least 400 samples per each location to achieve a good result  not energy efficient. SensLoc: – Solely based on APs names  not fine grained. – Continuously scans for WiFi signals  not energy efficient. 23

Department of Electrical and Computer Engineering LBS – Indoor place identification (LOIRE) LOIRE is different from the previous approaches the following aspects: – Unsupervised and nonparametric approach. – Energy efficiency (requires only 50 samples/place). – A framework to handle missing data. – An online batch sampling approach. – A quickest way to stop the algorithm. 24

Department of Electrical and Computer Engineering LBS – Indoor place identification (LOIRE) 25

Department of Electrical and Computer Engineering LBS – Missing data Use WiFi scans as signature to identify a revisited place and to detect a new place. Problems: Missing 1 room Or 2 rooms? Variable length observa tions 26

Department of Electrical and Computer Engineering LBS – Missing data: Nonparametric categorical clustering Calculate the Jaccard distance of two vectors of APs with different length: Given the distance, we propose a kernel density estimation approach based on the Mean Shift to classify the places in coarse grained level. Rooms within the same region share the same list of APs. Strongest common APs will be chosen based on the frequencies of their appearances in the WiFi scan list (red circle). 27

Department of Electrical and Computer Engineering LBS: IGMM The number of rooms is not given: – How to identify revisited room? – How to detect a new room? – Batch sampling, how to utilize? WiFi scans from 4 rooms share the same list of Aps. 28

Department of Electrical and Computer Engineering LBS: Online sampling Assume there are K stored places. Place identification purpose: – Find a label, z i, for a new observed WiFi scan, X i, in the set of 1:K. Detect a new place: – Find the label, z i, for a new observed WiFi scan, X i to see if z i = K+1 (a new place). – A stochastic way to detect a new place, not a threshold based approach. 29

Department of Electrical and Computer Engineering LBS: Online sampling PDF P new P old 30

Department of Electrical and Computer Engineering LBS: Online sampling For the problem of place identification: Use MAP to find the best candidate at every sampling step. MAP works now, since the parameters are updated after every single sampling step  Place identification solved. Quickest problem? 31

Department of Electrical and Computer Engineering LBS : Stopping rule Quickest detection for multiple hypotheses. Use the accumulate log posterior ratio:, f 1 is P old, f 0 is P new 32

Department of Electrical and Computer Engineering LBS – Experimental results. Dataset: – 4 weeks long – 5 phones 33

Department of Electrical and Computer Engineering LBS – Future location prediction Once the locations can be determined, we can build algorithm to predict the next visiting location. Propose two models to predict – Based on Markov model: A Dynamic Hidden Markov Model. – Based on Deep Learning. 34

Department of Electrical and Computer Engineering Proposed Dynamic hidden Markov model (DHMM) Hidden States/locations: propose to use NBC to determine the states. Dimensions of the observations : GPS coordinates, time and RSS from either WiFi signal or cell tower signal. Dynamic Hidden Markov Model: Every time the user comes to a new place, the model automatically updates itself with the new state. LBS – Future location prediction 1 35 S1S1 S2S2 S3S3 SKSK Rss 1 Rss 2 Rss 3 Rss K

Department of Electrical and Computer Engineering Proposed algorithm LBS – Future location prediction 1 N data points-Training data Gibb Sampler Determine the number of states and the current state. Observe more data MDP Optimal scheduling result DHMM: - Calculate the transition matrix - Calculate the distributions of signal strengths in each state 36 Schedule tolerant data package: – Each data package has a deadline to be sent. – When to sent? Wait until the signal strength profile is at its best to send. – How to predict the future signal strength? Predict the next locations of the users, estimate the signal strength at the locations. Use Markov Decision Process (MDP) to calculate the expected reward.

Department of Electrical and Computer Engineering Simulation results LBS – Future location prediction 1 37 Two states Same room

Department of Electrical and Computer Engineering Cost saving LBS – Future location prediction 1 38 Naïve: Send immediately UPDATE Proposed Approach

Department of Electrical and Computer Engineering Based on Deep Learning Purpose: Find the typical moving patterns (E1, E2), based on that, identify users and predict the future locations. – User identification: E2 E1 – Location prediction: 39 LBS – Future location prediction 2

Department of Electrical and Computer Engineering Deep Learning – Restricted Bolzman Machine (RBM) LBS – Future location prediction 2 40

Department of Electrical and Computer Engineering Deep learning - basics Stacking a number of the RBMs learned layer by layer from bottom-up gives rise to a DBN: After learning an RBM we treat the activation probabilities of its hidden units as the data for training the RBM one layer up 41 - Start with random weights, learn about activation energy and the probability to turn on the hidden units: - Then, the energy of any configuration is determined - Finally, optimum weights are chosen based on the difference between generated data and observations (1) LBS – Future location prediction 2

Department of Electrical and Computer Engineering Bottom up: – Initiate random weights. – Learn the activation energy of the first hidden layer. – Treat the first hidden layer as the observation layer for the second layer. Repeat the process for all layers. Top down: – Regenerate the observations based on the parameters and optimize the weights according to equation (1). Repeat the above two steps until converge. LBS – Future location prediction 2 42

Department of Electrical and Computer Engineering Experiment results Deep learning: PCA: 43 LBS – Future location prediction 2

Department of Electrical and Computer Engineering Presentation outlines Introduction. – Security for wireless network and contributions. – Location based services for wireless devices and contributions. Nonparametric classification techniques. Security for wireless devices. – Masquerade attack and Sybil attack. Location based services. – LOIRE – Dynamic Hidden Markov Model – Deep Learning Conclusion and future work. 44

Department of Electrical and Computer Engineering Conclusion Unsupervised approaches. Resolve the incomplete data problem Invent an online sampling approach Two novel approaches in predicting users’ future whereabouts. Energy-efficient research direction. Proven success with experiment evaluations. 45

Department of Electrical and Computer Engineering Future works Develop a new sampling approach for the security framework. Incorporate other sensory data like magnetic field from the magnetometer or lighting sensory data. Working on the problem of Quickest Detection to determine stopping rules. Integrate HDMM into LOIRE. Complete the prediction part using Deep Learning. Develop applications based on the current LBS framework and integrate different types of services: – Micro-climate control. – Geofencing application. 46

Department of Electrical and Computer Engineering Publication list Journal Publications 1. Nam Tuan Nguyen, Rong Zheng, and Zhu Han, “ROOMMATEs: An Unsupervised Indoor Peer Discovery Approach for LTE D2D Communications,” under submission. 2. Nam Tuan Nguyen, Rong Zheng, Zhu Han and Jie Liu, “Energy-Efficient Inference of Recurring and New Indoor Places of Mobile Users,” under submission. 3. M. Esmalifalak, Nam Tuan Nguyen, Lanchao Liu, R. Zheng, and Z. Han, “Detecting Stealthy False Data Injection Using Machine Learning in Smart Grid” under submission. 4. Nam Tuan Nguyen, Rong Zheng, and Zhu Han, “On Identifying Primary User Emulation Attacks in Cognitive Radio Systems Using Nonparametric Bayesian Classification,” IEEE Transactions on Signal Processing, vol. 60, no.3, p.p , March Jia (Jasmine) Meng, Yingying Li, Nam Tuan Nguyen, Wotao Yin, and Zhu Han, “Compressive Sensing Based High Resolution Channel Estimation for OFDM System," IEEE Journal of Selected Topics in Signal Processing, special issue on Robust Measures and Tests Using Sparse Data for Detection and Estimation, vol.6, no.1, p.p , February

Department of Electrical and Computer Engineering Publication list Conference Publications 1.M. Esmalifalak, Nam Tuan Nguyen, R. Zheng, and Z. Han, “Detecting Stealthy False Data Injection Using Machine Learning in Smart Grid”, Globecom Hao Wu, Saurabh Prasad, Minshan Cui, Nam Tuan Nguyen and Zhu Han, “Hyperspectral Image Classification Using Infinite Gaussian Mixture Models,” IEEE International Geoscience and Remote Sensing Symposium, Melbourne, Australia, July Nam Tuan Nguyen, Rong Zheng and Zhu Han, “UMLI: An Unsupervised Mobile Locations Extraction Approach with Incomplete Data,” IEEE Wireless Communications and Networking Conference WCNC, Shanghai, China, April (Best Paper Award) 4.Nam Tuan Nguyen, Yichuan Wang, Husheng Li, Xin Liu, and Zhu Han, “Extracting Typical Users’ Moving Pattern Using Deep Learning,” IEEE Globe Communication Conference Globecom, Anaheim, CA, December Nam Tuan Nguyen, Yichuan Wang, Xin Liu, Rong Zheng, and Zhu Han, “A Nonparametric Bayesian Approach for Opportunistic Data Transfer in Cellular Networks,” WASA, M. Ejaz Ahmed, Ju Bin Song, Nam Tuan Nguyen, and Zhu Han, “Nonparametric Bayesian Identification of Primary Users’ Payloads in Cognitive Radio Networks,” IEEE International Conference on Communications ICC, Ottawa, Canada, Huy Nquyen, Nam Tuan Nguyen, Guanbo Zheng, Zhu Han, and Rong Zheng, “Binary Blind Identification of Wireless Transmission Technologies for Wide-band Spectrum Monitoring," IEEE Globe Communication Conference Globecom, Houston, December Nam Tuan Nguyen, Guanbo Zheng, Zhu Han and Rong Zheng, “Device Fingerprinting to Enhance Wireless Security using Nonparametric Bayesian Method,” IEEE Annual Conference on Computer Communications INFOCOM, Shanghai, April (Acceptance rate: 15.96%). 9.Jia (Jasmine) Meng, Yingying Li, Nam Tuan Nguyen, Wotao Yin and Zhu Han, “High Resolution OFDM Channel Estimation with Low Speed ADC using Compressive Sensing,” IEEE International Conference on Communications ICC, Kyoto, Japan,

Department of Electrical and Computer Engineering 49 Question?