{"671135":{"#nid":"671135","#data":{"type":"event","title":"Ph.D. Dissertation Defense - Meng-Che Chang","body":[{"value":"\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003ETitle\u003C\/span\u003E\u003C\/strong\u003E\u003Cem\u003E\u003Cspan\u003E:\u0026nbsp; \u003C\/span\u003E\u003C\/em\u003E\u003Cem\u003E\u003Cspan\u003EOnline Decision-Making under Information-Theoretic Constraints\u003C\/span\u003E\u003C\/em\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003ECommittee:\u003C\/span\u003E\u003C\/strong\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. \u003C\/span\u003E\u003Cspan\u003EMatthieu Bloch, ECE, Chair\u003C\/span\u003E\u003Cspan\u003E, Advisor\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. \u003C\/span\u003E\u003Cspan\u003EJustin Romberg, ECE\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. \u003C\/span\u003E\u003Cspan\u003ESiva Theja Maguluri, ISyE\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. \u003C\/span\u003E\u003Cspan\u003EMark Davenport, ECE\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. \u003C\/span\u003E\u003Cspan\u003EYao Xie, ISyE\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EWe consider the problems of online decision making under two categories of information-theoretical constraints, namely, security and communication constraints. There are several security related performance metrics that are considered in this thesis. When the decision maker aims to avoid the adversary from gaining accurate estimation about the unknown parameter, we formulate the problem of evasive hypothesis testing. This problem can be viewed as the counterpart of \u0026nbsp;secured communication in the context of hypothesis testing. The objective is to maximize the quantity which captures the ratio of error exponents between the decision maker and the adversary. When the goal is not to hide the parameter but to make the process of decision making algorithm undetectable, we formulate the problem of \u0026nbsp;covert decision making. We show the algorithm also need to obey the square-root law in order to hide the presence of the algorithm. The last security related performance metric we consider in this thesis is the robustness of the algorithm. We are interested in analyzing the performance of active hypothesis testing when actions are potentially corrupted by the adversary.\u0026nbsp;\u003Cbr \/\u003E\r\nProblems that involve jointly estimating the channel state and transmitting information are called joint communication and sensing. In the second half of this thesis, we analyze the tradeoff between the detection error exponent and the communication rate in the problems of joint communication and sensing in both mono-static and bi-static models.\u003Cbr \/\u003E\r\nFinally, we also make an extension to the case when the transmission window can be determined online, and we call it sequential joint communication and sensing.\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"Online Decision-Making under Information-Theoretic Constraints "}],"uid":"28475","created_gmt":"2023-11-17 10:58:02","changed_gmt":"2023-11-17 10:58:27","author":"Daniela Staiculescu","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2023-11-27T09:00:00-05:00","event_time_end":"2023-11-27T11:00:00-05:00","event_time_end_last":"2023-11-27T11:00:00-05:00","gmt_time_start":"2023-11-27 14:00:00","gmt_time_end":"2023-11-27 16:00:00","gmt_time_end_last":"2023-11-27 16:00:00","rrule":null,"timezone":"America\/New_York"},"location":"Room 523A, TSRB","extras":[],"groups":[{"id":"434381","name":"ECE Ph.D. Dissertation Defenses"}],"categories":[],"keywords":[{"id":"100811","name":"Phd Defense"},{"id":"1808","name":"graduate students"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1788","name":"Other\/Miscellaneous"}],"invited_audience":[{"id":"78771","name":"Public"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}