T. Charles Clancy, PhD

As director of the Hume Center, my research portfolio broadly covers wireless, cyber security, unmanned platforms, and data analytics, as they apply to the national security sector. This includes topics such as signals intelligence; cyber warfare; electronic warfare; information operations; computer network attack, defense, and exploitation; automated intelligence analysis; intelligence visualization; and many other related areas.

My personal research interests surround wireless security and robustness at all layers of the network stack, which includes topics such as physical layer security, electronic warfare, quality of service in cognitive radio networks, and authentication and encryption in wireless networks. I have worked extensively with software-defined radio (SDR) and cognitive radio (CR) technologies, and am interested in robustness and security issues surrounding SDR/CR-based networks.

Current reserach projects:

  • Spectrum Sharing in Military Radar Bands
    • This project is investigating how legacy military radar systems operating in the 3.5 GHz frequency band can securely coexist with commercial secondary users, such as LTE and WiFi. The research focuses on security aspects of spectrum coordination and advanced array techniques for radar transmit eigen-nulling in multipath channels.
    • Sponsors: DARPA, OSD
    • Publications: Google Scholar
  • Advanced Electronic Warfare Techniques for 4G Communications
    • This project investigates jamming and anti-jamming techniques in OFDM/MIMO-based 4G communications systems such as LTE and WiMAX. By understanding the weakensses, hardened profiles of these standards can be proposed for use in military communications systems.
    • Sponsors: DARPA, ONR, AFRL, OSD
    • Publications: Google Scholar
  • Cognitive Electronic Warfare and Adversary Strategy Modeling
    • This project studies how use of machine learning to develop a state machine model for one's adversary in electromagnetic battlespace enables optimal strategy selection. Additionally it studies the advantages and disadvantages of sophsiticated spoofing and deception attacks. We seek to understand fundamental bounds on the capacity for adversary learning, nonstationary strategy development to reduce the fidelity of learning, and implementation approaches in realistic environments.
    • Sponsors: DARPA, AFRL, ONR, NRL
    • Publications: Google Scholar