Stephen Russell’s research while affiliated with Jackson health system and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (43)


Heuristic figure of AX transmitting a bit to AY.
The noisy channel diagram corresponding to the first figure.
Plot of C2,2(a,b) along with its level set contours. This figure shows the symmetries (18) about the lines y=x and y=−x+1 as seen by how the countours can be folded onto each other across the two lines. C is the capacity.
Closed disk D of radius 0.15, about the point (0.6,0.2), that consists only of positive channels. The boundary of the disk is the circle ∂D.
Example 1 illustrated with level sets of capacity with more detail than Figure 4.

+3

Mutual Information and Multi-Agent Systems
  • Article
  • Full-text available

November 2022

·

49 Reads

Ira S. Moskowitz

·

Pi Rogers

·

Stephen Russell

We consider the use of Shannon information theory, and its various entropic terms to aid in reaching optimal decisions that should be made in a multi-agent/Team scenario. The methods that we use are to model how various agents interact, including power allocation. Our metric for agents passing information are classical Shannon channel capacity. Our results are the mathematical theorems showing how combining agents influences the channel capacity.

Download

Internet of Battlefield Things: Challenges, Opportunities, and Emerging Directions

October 2022

·

111 Reads

·

13 Citations

The internet of battlefield things (IoBT) is expected to be a major feature of future tactical wireless networks. Multiple challenges arise from the expected scale, heterogeneity, information sharing (in a joint or coalition environment), dynamics, and actions of sophisticated adversaries. The chapter will discuss these challenges in detail, and explore emerging directions which provide opportunities to enable a scalable, secure, and performant IoBT.


Maximizing Energy Efficiency With Channel Uncertainty Under Mutual Interference

October 2022

·

27 Reads

·

6 Citations

IEEE Transactions on Wireless Communications

·

Y. Thomas Hou

·

·

[...]

·

Stephen Russell

We study the problem of channel uncertainty on wireless transmissions from different users with mutual interference. Specifically, the channel gains from the transmitters to the receivers are available only through their mean and covariance rather than complete distributions. Our goal is to maximize the energy efficiency among all transmitter-receiver pairs while guaranteeing their capacity requirements. For this problem, we employ chance-constrained programming (CCP), which allows occasional violation of target capacity threshold as long as the probability of such violation is below a small tolerable constant (risk level). We propose a solution based on a novel reformulation technique that converts the original CCP into a deterministic optimization problem without relaxation errors. Then the deterministic optimization problem is approximated into a Geometric Program (GP) based on tight polynomial approximations, which can be solved optimally. We prove that our proposed solution achieves near-optimal performance with polynomial time complexity.



Toward Safe Decision-Making via Uncertainty Quantification in Machine Learning

November 2021

·

12 Reads

·

4 Citations

The automation of safety-critical systems is becoming increasingly prevalent as machine learning approaches become more sophisticated and capable. However, approaches that are safe to use in critical systems must account for uncertainty. Most real-world applications currently use deterministic machine learning techniques that cannot incorporate uncertainty. In order to place systems in critical infrastructure, we must be able to understand and interpret how machines make decisions. This need is so that they can provide support for human decision-making, as well as the potential to operate autonomously. As such, we highlight the importance of incorporating uncertainty into the decision-making process and present the advantages of Bayesian decision theory. We showcase an example of classifying vehicles from their acoustic recordings, where certain classes have significantly higher threat levels. We show how carefully adopting the Bayesian paradigm not only leads to safer decisions, but also provides a clear distinction between the roles of the machine learning expert and the domain expert.


Re-orienting Toward the Science of the Artificial: Engineering AI Systems

November 2021

·

59 Reads

·

4 Citations

AI-enabled systems are becoming more pervasive, yet system engineering techniques still face limitations in how AI systems are being deployed. This chapter provides a discussion of the implications of hierarchical component composition and the importance of data in bounding AI system performance and stability. Issues of interoperability and uncertainty are introduced and how they can impact emergent behaviors of AI systems are illustrated through the presentation of a natural language processing (NLP) system used to provide similarity comparisons of organizational corpora. Within the bounds of this discussion, we examine how the concepts from Design science can introduce additional rigor to AI complex system engineering.


Cyber-(in)Security, Revisited: Proactive Cyber-Defenses, Interdependence and Autonomous Human-Machine Teams (A-HMTs)

January 2021

·

30 Reads

·

3 Citations

The risks from cyber threats are increasing. Cyber threats propagate primarily with deception. Threats from deception derive from insider and outsider attacks. These threats are countered by reactive and proactive cyber-defenses. Alarmingly, increasing proactive cyber defenses simulate conflicts from the Wild West of yesteryear. However, deception is inadequately addressed with traditional theories based on methodological individualism (MI). Worse, MI’s rational choice theory breaks down in the presence of social conflict. In contrast, interdependence theory addresses barriers, deception to penetrate the vulnerabilities of barriers and the conflict which ensues, topics where interdependence theory thrives. Interdependence includes the effects of the constructive or destructive interference that constitute every social interaction. Our research primarily addresses the application of interdependence theory to autonomous human-machine teams (A-HMTs), which entails artificial intelligence (AI) and AI’s sub-field of machine learning (ML). A-HMTs require defenses that protect a team from cyberthreats, adverse interference and other vulnerabilities while affording the opportunity for a team to become autonomous. In this chapter, we focus on an introduction that includes a review of traditional methodological individualism and rational choice theory. Our introduction is followed by a discussion of deception and its implications for reactive cyber defenses. We next cover proactive cyber defenses in a separate section. Then we review our research on interdependence theory and its application to A-HMTs. We conclude that while cyber-risks are increasing, so too is the teamwork that strengthens cyber-defenses. The future belongs to a theory of interdependence that improves cyber-defenses, teams and the science that generalizes to A-HMTs.


Maximize Spectrum Efficiency in Underlay Coexistence With Channel Uncertainty

January 2021

·

39 Reads

·

4 Citations

IEEE/ACM Transactions on Networking

We consider an underlay coexistence scenario where secondary users (SUs) must keep their interference to the primary users (PUs) under control. However, the channel gains from the PUs to the SUs are uncertain due to a lack of cooperation between the PUs and the SUs. Under this circumstance, it is preferable to allow the interference threshold of each PU to be violated occasionally as long as such violation stays below a probability. In this article, we employ Chance-Constrained Programming (CCP) to exploit this idea of occasional interference threshold violation. We assume the uncertain channel gains are only known by their mean and covariance. These quantities are slow-changing and easy to estimate. Our main contribution is to introduce a novel and powerful mathematical tool called Exact Conic Reformulation (ECR), which reformulates the intractable chance constraints into tractable convex constraints. Further, ECR guarantees an equivalent reformulation from linear chance constraints into deterministic conic constraints without the limitations associated with Bernstein Approximation, on which our research community has been fixated on for years. Through extensive simulations, we show that our proposed solution offers a significant improvement over existing approaches in terms of performance and ability to handle channel correlations (where Bernstein Approximation is no longer applicable).


Achieving Real-Time Spectrum Sharing in 5G Underlay Coexistence With Channel Uncertainty

January 2021

·

5 Reads

·

2 Citations

IEEE Transactions on Mobile Computing

Underlay coexistence is a spectrum efficient mechanism to roll out 5G picocells within a macrocell on the same spectrum. Due to a lack of cooperation between the primary users (PUs) in the macrocell and secondary users (SUs) in the picocells, it is impossible to have complete knowledge of channel conditions between them. Under such a circumstance, chance-constrained programming (CCP) has been shown to be an ideal optimization tool to address such a channel uncertainty. However, solutions to CCP are computationally intensive and cannot meet 5G's timing requirement (125 s). To address this problem, we propose a novel scheduler called GPU-based Underlay Coexistence (GUC) with the goal of finding an approximate solution to CCP in real-time. The essence of GUC is to decompose the original optimization problem into a large number of small subproblems that are suitable for parallel computation on GPU platforms. By selecting a subset of promising subproblems and solving them in parallel with fast algorithms, we are able to leverage GPU parallel computing and develop a real-time solution. Through extensive experiments, we show that GUC meets the 125 s requirement while achieving 90% optimality on average.



Citations (33)


... By identifying devices based on capabilities rather than type, this approach simplifies client-side control and enables platform-independent operations. [3] detailed the challenges posed by the scale, heterogeneity, information sharing needs of coalition environments, dynamic behaviour, and sophisticated adversaries, while also exploring emerging directions for scalable, secure, and performant IoBT. [4] presented two architectures and their corresponding trade-offs for contentcentric military IoT, optimizing information dissemination across tactical data links for disconnected, intermittent, and limited (DIL) connectivity. ...

Reference:

Digital Twins for Internet of Battlespace Things (IoBT) Coalitions
Internet of Battlefield Things: Challenges, Opportunities, and Emerging Directions
  • Citing Chapter
  • October 2022

... In the literature, DRCCPs have emerged as a popular approach to addressing decision-making problems under uncertainty when the distributional information is not fully known (see, e.g., Zymler et al. 2013;Hanasusanto et al. 2015Hanasusanto et al. , 2017Xie and Ahmed 2018;Ji and Lejeune 2021;Shen and Jiang 2021;Xie 2021;Chen et al. 2022;Ho-Nguyen et al. 2022;Jiang and Xie 2022;Küçükyavuz and Jiang 2022;Chen et al. 2023;Ho-Nguyen et al. 2023;Jiang and Xie 2023;Shen and Jiang 2023), such as energy (see, e.g., Xie andAhmed 2017, Zhou et al. 2021), transportation (see, e.g., Ghosal andWiesemann 2020, Zhao and, and telecommunications (see, e.g., Li et al. 2016;Li et al. 2022aLi et al. ,b, 2023Zhai et al. 2022). For instance, in the updated lecture notes of Shapiro et al. (2021), the authors used DRCCPs to optimize investment portfolios while ensuring the probability of incurring unacceptable losses stays within a predetermined limit. ...

Maximizing Energy Efficiency With Channel Uncertainty Under Mutual Interference
  • Citing Article
  • October 2022

IEEE Transactions on Wireless Communications

... For example, AI/AA enabled Decision Aids can help warriors in both air and ground combat be able to "analyze the environment" better and "detect and analyze targets" (Adams, 2001). AI/AA enabled Decision Aids can help mitigate human error and create information and decision advantage on the battlefield (Cobb, Jalaian, Bastian, & Russell, 2021). These example information triage advantages gained by AI/AA enabled Decision Aids guided our operational vignette and M&S scenario development. ...

Robust Decision-Making in the Internet of Battlefield Things Using Bayesian Neural Networks
  • Citing Conference Paper
  • December 2021

... However, in safety-constrained decision-making, it is crucial to estimate and factor in the level of certainty and doubt associated with each classification decision [3]. In such scenarios, even small chances of risky outcomes may have a significant impact on classification decisions, regardless of the most probable predicted outcome, and safety-critical applications need to be sensitive to such tail probabilities [1], [2]. ...

Toward Safe Decision-Making via Uncertainty Quantification in Machine Learning
  • Citing Chapter
  • November 2021

... Using deception, an individual playing an instrumental role in a team could double as a spy against the team. To keep from being perceived as a "bad" actor within the team by fellow teammates, based on Equation (10), a deceiver must reduce the entropy it produces structurally, making it particularly difficult in cyber-warfare to identify an unwelcome intrusion [95] when an interloper does not stand out (e.g., in the literature, [82]). An example from the field is what happened with Volkswagen [96], an organization selling cars by deceiving the public and the public's regulators regarding its faithful application of the rules, a deception that succeeded until it was uncovered years later; namely, six years ago, Volkswagon admitted to the deceitful gambit that its emissions failed to meet regulatory standards [83]: "U.S. authorities charged Volkswagen with conspiracy to commit fraud, making false statements on goods brought for sale in the U.S. and obstruction of justice. ...

Cyber-(in)Security, Revisited: Proactive Cyber-Defenses, Interdependence and Autonomous Human-Machine Teams (A-HMTs)
  • Citing Chapter
  • January 2021

... It is covariant differentiation, which is the directional derivative of the vector field _ c(t) in the direction _ c(t) with adjustments for curvature K. Details can be readily found in the literature (e.g. [14]). Since the one local coordinate system (patch) we have given for B suffices, the geodesic equation reduces to ...

An information geometric look at the valuing of information
  • Citing Chapter
  • January 2020

... In our CNN architecture, the process of normalization is crucial to align the data distribution, which is achieved through the batch normalization technique. This process is mathematically defined by the following equations [21]: ...

Context: Separating the forest and the trees—Wavelet contextual conditioning for AI
  • Citing Chapter
  • January 2020

... They add up to heterogeneous data/information fusion challenges in the context of the MDO [4]- [7], in addition to 5Vs of big data (volume, value, variety, velocity, and veracity) where the mentioned works are limited to the number of domains or sources, or not able to process a wide variety of data in realtime. While there are attempts to explore the use of AI/ML models and discuss their perspective on integrated systems opportunities and challenges for multi-domain operations [8], [9] there is no reported integrated solution so far. Hence, the IDEaS challenge [3] expressing the need for such a system in Canada. ...

The multi-domain effects loop: from future concepts to research challenges (Conference Presentation)
  • Citing Conference Paper
  • April 2020

... Det er endvidere valgt at fokusere på disse tre områder, fordi NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) peger på disse områder som centrale for at kunne synkronisere kinetiske og cyberoperationer (CO; se Gady and Stronell, 2020). Forskning peger også på disse områder som vaerende vigtige (Russell, Abdelzaher and Suri, 2019). Gennemgående diskuteres resultaterne i forhold til tidligere forskning, og til sidst opstilles mulige løsninger knyttet til problemkomplekset. ...

Multi-Domain Effects and the Internet of Battlefield Things
  • Citing Conference Paper
  • November 2019