Our research program is dedicated to developing efficient and secure network and system architectures that facilitate the rapid, reliable, private, and secure delivery and processing of information. The proliferation of heterogeneous mobile and wireless devices, such as smartphones and IoT devices, generates an ever-increasing volume of data, while available spectrum and bandwidth resources become increasingly scarce. Simultaneously, advancements in hardware and software capabilities, coupled with improved energy efficiency, empower these devices to not only communicate and network but also sense, compute, and interact with the physical world.
Networks are evolving into multifunctional, intelligent infrastructures supporting integrated communication, sensing, data storage, and computation. This transformation enables a wide range of exciting applications and services, including Augmented/Virtual Reality (AR/VR or XR), Connected and Autonomous Vehicles (CAVs), and Collaborative Multi-Agent Systems (e.g., robotic fleets or embodied AI agents). To support these applications, which often require edge computing for low-latency processing, new network architectures, protocols, and algorithms are essential. Moreover, the rapid advancements in Artificial Intelligence (AI) and Machine Learning (ML) present opportunities to enhance system intelligence not only at the application level but also within the network fabric itself.
However, these novel computing paradigms also introduce new vulnerabilities that can be exploited by malicious actors for economic gain or societal harm. The widespread collection and storage of personal information across interconnected systems make individuals more susceptible to cyberattacks and data breaches. The rapid pace of device deployment often prioritizes market competitiveness over security, leading to inherent vulnerabilities in their designs. As a result, the very technologies we develop can have unintended negative consequences, including economic loss and threats to public safety. To prevent a cycle of continuous vulnerability and remediation, it is imperative to prioritize security, privacy, and safety in the design and development of networked intelligent systems.
Research Methodology
Our goal is to develop both solid foundations and practical mechanisms for performance, and security/privacy/safety assurance in emerging networked intelligent systems, to make them dependable and trustworthy. Our research is devoted not only to make them resilient to malicious attacks, but also to promote proactive built-in security protection in their early design. Our research philosophy is to bring together theory and practice. On the theoretical side, we may leverage tools from communications and networking, signal processing, optimization, machine learning, algorithm design, and applied cryptography. On the practical side, we may investigate a variety of applications and make use of real-world networked devices such as vehicles, drones, IoT platforms, and various datasets, experimental/simulation platforms such as software-defined radios, etc. We always keep an open mind to new problems and toolsets, and are prepared to challenge existing and well-established assumptions.
Research Topics/Projects
Ongoing Research Topics
Security and Privacy of NextG Radio Access Networks
Next-generation (NextG) cellular systems will be designed with awareness, intelligence, and flexibility to support diverse use cases such as telepresence, immersive sports, connected intelligent machines and interacting robots, precision healthcare, and others. These attributes will be realized through groundbreaking technologies in uncharted frequency bands, e.g., millimeter-wave (mmWave) and Teraherz (THz) bands, virtualized core and radio access network (RAN) architectures, new spectrum sharing models, and powerful machine learning algorithms that optimally manage resources. Various AI/ML approaches can be adopted for NextG RAN management and control, such as reinforcement learning (RL). However, RAN resource sharing exposes the network to new security threats that target the robustness of the decision-making process. Our research aims to study RAN resource management algorithms in an adversarial setting, mitigate user privacy leakage, and develop mechanisms to ensure that RAN policies are designed to meet service level agreements.
Security and Privacy of Integrated Sensing and Communications (ISAC)
To meet the diverse service demands of NextG applications, NextG networks will support new wireless capabilities in the mmWave and THz bands that go beyond communications and simultaneously support high-resolution sensing. By integrating sensing into the communications network, the network acts as a "radar" sensor, using its own radio signals to sense and comprehend the physical world in which it operates. The sensing data can then be leveraged to enhance the network’s own operations, augment existing services such as XR and digital twinning, and enable new services such as gesture/activity recognition, imaging and environment reconstruction. While ISAC offers significant performance benefits, its security and resiliency issues have been largely under-explored. Our research investigates the security of ISAC including novel vulnerabilities and defense mechanisms, and exploit ISAC to build secure-by-design NextG applications.
Secure and Trustworthy AI-Empowered Autonomous Systems
Autonomous Systems (AS), such as self-driving cars, robotic agents (Embodied AI), and surveillance systems, rely heavily on sensors to perceive their surroundings and make informed, autonomous decisions. The security of these systems has become increasingly critical, as malicious actors can exploit vulnerabilities in the perception pipeline, leading to potentially catastrophic consequences. Our research focuses on studying the security vulnerabilities of sensor perception and decision-making modules in autonomous systems, including their sensing mechanisms along with the ML-based object detection, tracking and planning algorithms. For example, an adversary can remotely inject deceptive patterns into camera feeds, creating or altering objects in the perceived environment, causing unsafe control actions. To counter such threats, we will introduce a novel defense framework that leverages spatiotemporal consistency checks, which is agnostic to the specific sensing modality or attack vector.
Efficient and Robust Multi-Agent Collaborative Perception
Connected and Autonomous Vehicles (CAVs) will revolutionize transportation, promising enhanced safety and efficiency. Vehicle-to-Everything (V2X) connectivity enables vehicles and infrastructure to share information, fostering cooperative perception (CP) and decision making, enabling groundbreaking applications like cooperative driving, dynamic map updates, platooning, and infrastructure-assisted traffic management. Safety-critical CAV applications demand stringent performance requirements, including high perception accuracy, low end-to-end latency, and high reliability. Edge-assisted CP systems face challenges in scalable raw sensor data sharing from multiple vehicles and adapting to dynamic network conditions. Our research addresses these challenges by proposing a goal-oriented (semantic) communications framework, which leverages ML techniques to intelligently process and extract the most relevant information from the sensor data, and jointly optimizes the computation and communication resources at the vehicles and edge to meet the end-goals of CP. This research has broader implications, extending beyond CAVs to various multi-agent systems.
Ongoing Research Projects
- Secure Cyber-Physical Trust Binding for Networked Autonomous Systems, Army Research Office, 06/2025 - 06/2028, PI (Co-PI: Loukas Lazos).
- SaTC: CORE: Medium: Secure Resource Management in NextG Radio Access Networks: Attacks, Defenses, and Proofs of Service, National Science Foundation, $670,000, 10/01/2025 - 09/30/2028, Co-PI (PI: Loukas Lazos, Co-PI: Marwan Krunz).
Past/Completed Research Projects
We thank the generous support of:



