Contention-Resolution Algorithms. In many environments—such as standard WiFi (IEEE 802.11) and wireless ad-hoc networks—devices must share a common communication channel without relying on centralized coordination. Managing access in such decentralized settings poses significant challenges, particularly under energy limitations and interference, whether due to environmental factors or adversarial behavior. These constraints make the design of efficient and robust communication protocols particularly complex.

AI in Security. I am interested in applying AI techniques to strengthen and stabilize cyber and network security. Recently, this field has captured my attention, and I am already collaborating with others on developing secure networks using AI while emphasizing efficiency through reduced resource utilization (e.g., PU learning, NU learning, and contrastive learning).