Skip to main content

Showing 1–50 of 50 results for author: Abbas, W

.
  1. arXiv:2505.18076  [pdf, ps, other

    eess.SP eess.SY

    Analysis on Energy Efficiency of RIS-Assisted Multiuser Downlink Near-Field Communications

    Authors: Wei Wang, Xiaoyu Ou, Zhihan Ren, Waqas Bin Abbas, Shuping Dang, Angela Doufexi, Mark A. Beach

    Abstract: In this paper, we focus on the energy efficiency (EE) optimization and analysis of reconfigurable intelligent surface (RIS)-assisted multiuser downlink near-field communications. Specifically, we conduct a comprehensive study on several key factors affecting EE performance, including the number of RIS elements, the types of reconfigurable elements, reconfiguration resolutions, and the maximum tran… ▽ More

    Submitted 23 May, 2025; originally announced May 2025.

    Comments: 14 pages, 15 figures. This work has been accepted for publication in IEEE Transactions on Communications

  2. arXiv:2504.17278  [pdf, other

    math.CO math.AC

    An Upper Bound on Generalized Cospectral Mates of Oriented Graphs Using Skew-Walk Matrices

    Authors: Muhammad Raza, Obaid Ullah Ahmed, Mudassir Shabbir, Xenofon Koutsoukos, Waseem Abbas

    Abstract: Let $D$ be an oriented graph with skew adjacency matrix $S(D)$. Two oriented graphs $D$ and $C$ are said to share the same generalized skew spectrum if $S(D)$ and $S(C)$ have the same eigenvalues, and $J-S(D)$ and $J-S(C)$ also have the same eigenvalues, where $J$ is the all-ones matrix. Such graphs that are not isomorphic are generalized cospectral mates. We derive tight upper bounds on the numbe… ▽ More

    Submitted 24 April, 2025; originally announced April 2025.

    MSC Class: 05C50

  3. arXiv:2504.13909  [pdf

    cs.HC

    Mobile-Driven Incentive Based Exercise for Blood Glucose Control in Type 2 Diabetes

    Authors: Wasim Abbas, Hafiz Syed Muhammad Bilal, Asim Abbas, Muhammad Afzal, Je-Hoon Lee

    Abstract: We propose and create an incentive based recommendation algorithm aimed at improving the lifestyle of diabetic patients. This algorithm is integrated into a real world mobile application to provide personalized health recommendations. Initially, users enter data such as step count, calorie intake, gender, age, weight, height and blood glucose levels. When the data is preprocessed, the app identifi… ▽ More

    Submitted 10 April, 2025; originally announced April 2025.

    Comments: This is Master thesis (submitted)

  4. arXiv:2503.18859  [pdf

    cs.CR

    An End-to-End GSM/SMS Encrypted Approach for Smartphone Employing Advanced Encryption Standard(AES)

    Authors: Wasim Abbas, Salaki Reynaldo Joshua, Asim Abbas, Je-Hoon Lee

    Abstract: Encryption is crucial for securing sensitive data during transmission over networks. Various encryption techniques exist, such as AES, DES, and RC4, with AES being the most renowned algorithm. We proposed methodology that enables users to encrypt text messages for secure transmission over cellular networks. This approach utilizes the AES algorithm following the proposed protocols for encryption an… ▽ More

    Submitted 24 March, 2025; originally announced March 2025.

    Comments: Accepted in International Conference on Ubiquitous Information Management and Communication (IMCOM), 2024

  5. arXiv:2502.17713  [pdf, other

    cs.LG cs.MA eess.SY

    Learning Backbones: Sparsifying Graphs through Zero Forcing for Effective Graph-Based Learning

    Authors: Obaid Ullah Ahmad, Anwar Said, Mudassir Shabbir, Xenofon Koutsoukos, Waseem Abbas

    Abstract: This paper introduces a novel framework for graph sparsification that preserves the essential learning attributes of original graphs, improving computational efficiency and reducing complexity in learning algorithms. We refer to these sparse graphs as "learning backbones". Our approach leverages the zero-forcing (ZF) phenomenon, a dynamic process on graphs with applications in network control. The… ▽ More

    Submitted 24 February, 2025; originally announced February 2025.

    Comments: 13th International Conference on Complex Networks and their Applications

  6. arXiv:2409.11554  [pdf, ps, other

    cs.LG cs.SI

    PropEnc: A Property Encoder for Graph Neural Networks

    Authors: Anwar Said, Waseem Abbas, Xenofon Koutsoukos

    Abstract: Graph machine learning, particularly using graph neural networks, heavily relies on node features. However, many real-world systems, such as social and biological networks, lack node features due to privacy concerns, incomplete data, or collection limitations. Structural and positional encoding are commonly used to address this but are constrained by the maximum values of the encoded properties, s… ▽ More

    Submitted 9 June, 2025; v1 submitted 17 September, 2024; originally announced September 2024.

    Comments: conference paper

  7. arXiv:2405.03706  [pdf, other

    cs.LG

    Improving Graph Machine Learning Performance Through Feature Augmentation Based on Network Control Theory

    Authors: Anwar Said, Obaid Ullah Ahmad, Waseem Abbas, Mudassir Shabbir, Xenofon Koutsoukos

    Abstract: Network control theory (NCT) offers a robust analytical framework for understanding the influence of network topology on dynamic behaviors, enabling researchers to decipher how certain patterns of external control measures can steer system dynamics towards desired states. Distinguished from other structure-function methodologies, NCT's predictive capabilities can be coupled with deploying Graph Ne… ▽ More

    Submitted 3 May, 2024; originally announced May 2024.

    Comments: Conference paper

  8. arXiv:2403.09009  [pdf, other

    eess.SY

    A Geometric Approach to Resilient Distributed Consensus Accounting for State Imprecision and Adversarial Agents

    Authors: Christopher A. Lee, Waseem Abbas

    Abstract: This paper presents a novel approach for resilient distributed consensus in multiagent networks when dealing with adversarial agents imprecision in states observed by normal agents. Traditional resilient distributed consensus algorithms often presume that agents have exact knowledge of their neighbors' states, which is unrealistic in practical scenarios. We show that such existing methods are inad… ▽ More

    Submitted 13 March, 2024; originally announced March 2024.

    Comments: American Control Conference (ACC), 2024

  9. arXiv:2403.04923  [pdf, other

    cs.LG cs.MA eess.SY

    Control-based Graph Embeddings with Data Augmentation for Contrastive Learning

    Authors: Obaid Ullah Ahmad, Anwar Said, Mudassir Shabbir, Waseem Abbas, Xenofon Koutsoukos

    Abstract: In this paper, we study the problem of unsupervised graph representation learning by harnessing the control properties of dynamical networks defined on graphs. Our approach introduces a novel framework for contrastive learning, a widely prevalent technique for unsupervised representation learning. A crucial step in contrastive learning is the creation of 'augmented' graphs from the input graphs. T… ▽ More

    Submitted 17 April, 2024; v1 submitted 7 March, 2024; originally announced March 2024.

    Comments: Accepted in 2024 American Control Conference (ACC), July 8-12, 2024 in Toronto, ON, Canada

  10. arXiv:2310.12169  [pdf, other

    cs.SI cs.LG

    Enhanced Graph Neural Networks with Ego-Centric Spectral Subgraph Embeddings Augmentation

    Authors: Anwar Said, Mudassir Shabbir, Tyler Derr, Waseem Abbas, Xenofon Koutsoukos

    Abstract: Graph Neural Networks (GNNs) have shown remarkable merit in performing various learning-based tasks in complex networks. The superior performance of GNNs often correlates with the availability and quality of node-level features in the input networks. However, for many network applications, such node-level information may be missing or unreliable, thereby limiting the applicability and efficacy of… ▽ More

    Submitted 10 October, 2023; originally announced October 2023.

    Comments: 22nd IEEE International Conference on Machine Learning and Applications 2023

  11. arXiv:2310.02164  [pdf, other

    cs.LG

    A Survey of Graph Unlearning

    Authors: Anwar Said, Yuying Zhao, Tyler Derr, Mudassir Shabbir, Waseem Abbas, Xenofon Koutsoukos

    Abstract: Graph unlearning emerges as a crucial advancement in the pursuit of responsible AI, providing the means to remove sensitive data traces from trained models, thereby upholding the right to be forgotten. It is evident that graph machine learning exhibits sensitivity to data privacy and adversarial attacks, necessitating the application of graph unlearning techniques to address these concerns effecti… ▽ More

    Submitted 16 November, 2024; v1 submitted 23 August, 2023; originally announced October 2023.

    Comments: 22 page review paper on graph unlearning

  12. arXiv:2309.02649  [pdf, other

    eess.SY cs.MA

    Controllability Backbone in Networks

    Authors: Obaid Ullah Ahmad, Waseem Abbas, Mudassir Shabbir

    Abstract: This paper studies the controllability backbone problem in dynamical networks defined over graphs. The main idea of the controllability backbone is to identify a small subset of edges in a given network such that any subnetwork containing those edges/links has at least the same network controllability as the original network while assuming the same set of input/leader vertices. We consider the str… ▽ More

    Submitted 5 September, 2023; originally announced September 2023.

    Comments: Accepted in 62nd IEEE Conference on Decision and Control, Dec. 13-15, 2023, Singapore

  13. arXiv:2303.05596  [pdf, ps, other

    eess.SY

    Distributed Design of Controllable and Robust Networks using Zero Forcing and Graph Grammars

    Authors: Priyanshkumar I. Patel, Johir Suresh, Waseem Abbas

    Abstract: This paper studies the problem of designing networks that are strong structurally controllable, and robust simultaneously. For given network specifications, including the number of nodes $N$, the number of leaders $N_L$, and diameter $D$, where $2 \le D \le N/N_L$, we propose graph constructions generating strong structurally controllable networks. We also compute the number of edges in graphs, wh… ▽ More

    Submitted 9 March, 2023; originally announced March 2023.

    Comments: American Control Conference (ACC 2023)

  14. arXiv:2303.02366  [pdf, other

    eess.SY

    Resilient Strong Structural Controllability in Networks using Leaky Forcing in Graphs

    Authors: Waseem Abbas

    Abstract: This paper studies the problem of selecting input nodes (leaders) to make networks strong structurally controllable despite misbehaving nodes and edges. We utilize a graph-based characterization of network strong structural controllability (SSC) in terms of zero forcing in graphs, which is a dynamic coloring of nodes. We consider three types of misbehaving nodes and edges that disrupt the zero for… ▽ More

    Submitted 4 March, 2023; originally announced March 2023.

    Journal ref: ACC 2023

  15. Association schemes with a certain type of $p$-subschemes

    Authors: Wasim Abbas, Mitsugu Hirasaka

    Abstract: In this article, we focus on association schemes with some properties derived from the orbitals of a transitive permutation group $G$ with a one-point stabilizer $H$ satisfying $H <N_G(H)<N_G(N_G(H))\unlhd G$ and $|N_G(N_G(H))|=p^3$ where $p$ is a prime. By a corollary of our main result we obtain some inequality which corresponds to the fact $|G:N_G(N_G(H))|\leq p+1$.

    Submitted 6 December, 2021; originally announced December 2021.

    MSC Class: 05E15; 05E30

    Journal ref: ARS MATHEMATICA CONTEMPORANEA, 19(1), 51-60 (2020)

  16. arXiv:2109.01494  [pdf, other

    cs.LG cs.AI cs.DS

    Computing Graph Descriptors on Edge Streams

    Authors: Zohair Raza Hassan, Sarwan Ali, Imdadullah Khan, Mudassir Shabbir, Waseem Abbas

    Abstract: Feature extraction is an essential task in graph analytics. These feature vectors, called graph descriptors, are used in downstream vector-space-based graph analysis models. This idea has proved fruitful in the past, with spectral-based graph descriptors providing state-of-the-art classification accuracy. However, known algorithms to compute meaningful descriptors do not scale to large graphs sinc… ▽ More

    Submitted 8 April, 2023; v1 submitted 2 September, 2021; originally announced September 2021.

    Comments: Extension of work accepted to PAKDD 2020. Accepted to ACM TKDD in 2023

  17. arXiv:2105.06011  [pdf, other

    eess.SY cs.DM

    Edge Augmentation with Controllability Constraints in Directed Laplacian Networks

    Authors: Waseem Abbas, Mudassir Shabbir, Yasin Yazıcıoglu, Xenofon Koutsoukos

    Abstract: In this paper, we study the maximum edge augmentation problem in directed Laplacian networks to improve their robustness while preserving lower bounds on their strong structural controllability (SSC). Since adding edges could adversely impact network controllability, the main objective is to maximally densify a given network by selectively adding missing edges while ensuring that SSC of the networ… ▽ More

    Submitted 12 May, 2021; originally announced May 2021.

  18. arXiv:2102.01495  [pdf, other

    cs.IT eess.SP

    Deep Learning based Joint Precoder Design and Antenna Selection for Partially Connected Hybrid Massive MIMO Systems

    Authors: Salman Khalid, Waqas bin Abbas, Farhan Khalid

    Abstract: Efficient resource allocation with hybrid precoder design is essential for massive MIMO systems operating in millimeter wave (mmW) domain. Owing to a higher energy efficiency and a lower complexity of a partially connected hybrid architecture, in this letter, we propose a joint deep convolutional neural network (CNN) based scheme for precoder design and antenna selection of a partially connected m… ▽ More

    Submitted 2 February, 2021; originally announced February 2021.

  19. arXiv:2010.13032  [pdf, other

    cs.LG stat.ML

    Byzantine Resilient Distributed Multi-Task Learning

    Authors: Jiani Li, Waseem Abbas, Xenofon Koutsoukos

    Abstract: Distributed multi-task learning provides significant advantages in multi-agent networks with heterogeneous data sources where agents aim to learn distinct but correlated models simultaneously.However, distributed algorithms for learning relatedness among tasks are not resilient in the presence of Byzantine agents. In this paper, we present an approach for Byzantine resilient distributed multi-task… ▽ More

    Submitted 7 January, 2021; v1 submitted 25 October, 2020; originally announced October 2020.

    Journal ref: Thirty-fourth Conference on Neural Information Processing Systems (NeurIPS 2020)

  20. arXiv:2009.02417  [pdf, other

    eess.SY

    Interplay Between Resilience and Accuracy in Resilient Vector Consensus in Multi-Agent Networks

    Authors: Waseem Abbas, Mudassir Shabbir, Jiani Li, Xenofon Koutsoukos

    Abstract: In this paper, we study the relationship between resilience and accuracy in the resilient distributed multi-dimensional consensus problem. We consider a network of agents, each of which has a state in $\mathbb{R}^d$. Some agents in the network are adversarial and can change their states arbitrarily. The normal (non-adversarial) agents interact locally and update their states to achieve consensus a… ▽ More

    Submitted 4 September, 2020; originally announced September 2020.

    Comments: IEEE Conference on Decision and Control (CDC) 2020

  21. arXiv:2008.07495  [pdf, other

    eess.SY math.CO math.OC

    Strong Structural Controllability of Diffusively Coupled Networks: Comparison of Bounds Based on Distances and Zero Forcing

    Authors: Yasin Yazicioglu, Mudassir Shabbir, Waseem Abbas, Xenofon Koutsoukos

    Abstract: We study the strong structural controllability (SSC) of diffusively coupled networks, where the external control inputs are injected to only some nodes, namely the leaders. For such systems, one measure of controllability is the dimension of strong structurally controllable subspace, which is equal to the smallest possible rank of controllability matrix under admissible (positive) coupling weights… ▽ More

    Submitted 17 August, 2020; originally announced August 2020.

    Comments: Accepted to the 59th IEEE Conference on Decision and Control

  22. arXiv:2006.16854  [pdf, ps, other

    eess.SP cs.IT

    User Selection in Millimeter Wave Massive MIMO System using Convolutional Neural Networks

    Authors: Salman Khalid, Waqas bin Abbas, Farhan Khalid, Michele Zorzi

    Abstract: A hybrid architecture for millimeter wave (mmW) massive MIMO systems is considered practically implementable due to low power consumption and high energy efficiency. However, due to the limited number of RF chains, user selection becomes necessary for such architecture. Traditional user selection algorithms suffer from high computational complexity and, therefore, may not be scalable in 5G and bey… ▽ More

    Submitted 30 June, 2020; originally announced June 2020.

    Comments: 4 pages, 5 Figures

  23. Resilient Distributed Diffusion in Networks with Adversaries

    Authors: Jiani Li, Waseem Abbas, Xenofon Koutsoukos

    Abstract: In this paper, we study resilient distributed diffusion for multi-task estimation in the presence of adversaries where networked agents must estimate distinct but correlated states of interest by processing streaming data. We show that in general diffusion strategies are not resilient to malicious agents that do not adhere to the diffusion-based information processing rules. In particular, by expl… ▽ More

    Submitted 23 March, 2020; originally announced March 2020.

    Journal ref: in IEEE Transactions on Signal and Information Processing over Networks, vol. 6, pp. 1-17, 2020

  24. arXiv:2003.05497  [pdf, other

    eess.SY

    Resilient Distributed Vector Consensus Using Centerpoints

    Authors: Waseem Abbas, Mudassir Shabbir, Jiani Li, Xenofon Koutsoukos

    Abstract: In this paper, we study the resilient vector consensus problem in networks with adversarial agents and improve resilience guarantees of existing algorithms. A common approach to achieving resilient vector consensus is that every non-adversarial (or normal) agent in the network updates its state by moving towards a point in the convex hull of its \emph{normal} neighbors' states. Since an agent cann… ▽ More

    Submitted 14 August, 2021; v1 submitted 11 March, 2020; originally announced March 2020.

  25. arXiv:2003.05490  [pdf, other

    eess.SY

    Improving Network Robustness through Edge Augmentation While Preserving Strong Structural Controllability

    Authors: Waseem Abbas, Mudassir Shabbir, Hassan Jaleel, Xenofon Koutsoukos

    Abstract: In this paper, we consider a network of agents with Laplacian dynamics, and study the problem of improving network robustness by adding a maximum number of edges within the network while preserving a lower bound on its strong structural controllability (SSC) at the same time. Edge augmentation increases network's robustness to noise and structural changes, however, it could also deteriorate networ… ▽ More

    Submitted 11 March, 2020; originally announced March 2020.

    Comments: American Control Conference (ACC)2020, Denver

  26. arXiv:2001.10301  [pdf, other

    cs.DB

    Estimating Descriptors for Large Graphs

    Authors: Zohair Raza Hassan, Mudassir Shabbir, Imdadullah Khan, Waseem Abbas

    Abstract: Embedding networks into a fixed dimensional feature space, while preserving its essential structural properties is a fundamental task in graph analytics. These feature vectors (graph descriptors) are used to measure the pairwise similarity between graphs. This enables applying data mining algorithms (e.g classification, clustering, or anomaly detection) on graph-structured data which have numerous… ▽ More

    Submitted 19 February, 2020; v1 submitted 28 January, 2020; originally announced January 2020.

    Comments: Accepted to PAKDD 2020

  27. arXiv:2001.07056  [pdf, other

    eess.SY math.OC

    On the Impacts of Redundancy, Diversity, and Trust in Resilient Distributed State Estimation

    Authors: Aritra Mitra, Faiq Ghawash, Shreyas Sundaram, Waseem Abbas

    Abstract: We address the problem of distributed state estimation of a linear dynamical process in an attack-prone environment. Recent attempts to solve this problem impose stringent redundancy requirements on the measurement and communication resources of the network. In this paper, we take a step towards alleviating such strict requirements by exploring two complementary directions: (i) making a small subs… ▽ More

    Submitted 20 January, 2020; originally announced January 2020.

  28. Patch-based Generative Adversarial Network Towards Retinal Vessel Segmentation

    Authors: Waseem Abbas, Muhammad Haroon Shakeel, Numan Khurshid, Murtaza Taj

    Abstract: Retinal blood vessels are considered to be the reliable diagnostic biomarkers of ophthalmologic and diabetic retinopathy. Monitoring and diagnosis totally depends on expert analysis of both thin and thick retinal vessels which has recently been carried out by various artificial intelligent techniques. Existing deep learning methods attempt to segment retinal vessels using a unified loss function o… ▽ More

    Submitted 21 December, 2019; originally announced December 2019.

    Journal ref: Neural Information Processing. ICONIP 2019

  29. arXiv:1909.03565  [pdf, other

    eess.SY math.DS

    Computation of the Distance-based Bound on Strong Structural Controllability in Networks

    Authors: Mudassir Shabbir, Waseem Abbas, A. Yasin Yazicioglu, Xenofon Koutsoukos

    Abstract: In this paper, we study the problem of computing a tight lower bound on the dimension of the strong structurally controllable subspace (SSCS) in networks with Laplacian dynamics. The bound is based on a sequence of vectors containing the distances between leaders (nodes with external inputs) and followers (remaining nodes) in the underlying network graph. Such vectors are referred to as the distan… ▽ More

    Submitted 13 August, 2021; v1 submitted 8 September, 2019; originally announced September 2019.

  30. arXiv:1908.11308  [pdf, ps, other

    eess.SY math.CO math.OC

    Structural Robustness to Noise in Consensus Networks: Impact of Degrees and Distances, Fundamental Limits, and Extremal Graphs

    Authors: Yasin Yazicioglu, Waseem Abbas, Mudassir Shabbir

    Abstract: We investigate how the graph topology influences the robustness to noise in undirected linear consensus networks. We measure the structural robustness by using the smallest possible value of steady state population variance of states under the noisy consensus dynamics with edge weights from the unit interval. We derive tight upper and lower bounds on the structural robustness of networks based on… ▽ More

    Submitted 17 November, 2020; v1 submitted 29 August, 2019; originally announced August 2019.

    Comments: Accepted for publication in IEEE Transactions on Automatic Control

  31. arXiv:1907.10742  [pdf, other

    eess.SY cs.CR

    Leveraging Diversity for Achieving Resilient Consensus in Sparse Networks

    Authors: Faiq Ghawash, Waseem Abbas

    Abstract: A networked system can be made resilient against adversaries and attacks if the underlying network graph is structurally robust. For instance, to achieve distributed consensus in the presence of adversaries, the underlying network graph needs to satisfy certain robustness conditions. A typical approach to making networks structurally robust is to strategically add extra links between nodes, which… ▽ More

    Submitted 24 July, 2019; originally announced July 2019.

    Comments: 8th IFAC Workshop on Distributed Estimation and Control in Networked Systems (NecSys) 2019

  32. arXiv:1903.10422  [pdf, other

    cs.CV

    Locomotion and gesture tracking in mice and small animals for neurosceince applications: A survey

    Authors: Waseem Abbas, David Masip Rodo

    Abstract: Neuroscience has traditionally relied on manually observing lab animals in controlled environments. Researchers usually record animals behaving in free or restrained manner and then annotate the data manually. The manual annotation is not desirable for three reasons; one, it is time consuming, two, it is prone to human errors and three, no two human annotators will 100\% agree on annotation, so it… ▽ More

    Submitted 25 March, 2019; originally announced March 2019.

    Comments: 41 pages, 2 figures

    MSC Class: 68Txx

  33. arXiv:1903.05524  [pdf, other

    eess.SY

    On the Trade-off Between Controllability and Robustness in Networks of Diffusively Coupled Agents

    Authors: Waseem Abbas, Mudassir Shabbir, A. Yasin Yazicioglu, Aqsa Akber

    Abstract: In this paper, we demonstrate a conflicting relationship between two crucial properties---controllability and robustness---in linear dynamical networks of diffusively coupled agents. In particular, for any given number of nodes $N$ and diameter $D$, we identify networks that are maximally robust using the notion of Kirchhoff index and then analyze their strong structural controllability. For this,… ▽ More

    Submitted 14 July, 2020; v1 submitted 13 March, 2019; originally announced March 2019.

    Comments: IEEE Transactions on Control of Network Systems

  34. arXiv:1811.12811  [pdf, other

    cs.IT

    Millimeter Wave Receiver Comparison Under Energy vs Spectral Efficiency Trade-off

    Authors: Waqas bin Abbas, Felipe Gomez-Cuba, Michele Zorzi

    Abstract: Receivers for mmWave systems suffer from high power consumption in Analog to Digital Converters (ADC), and there is a need to compare the three major receiver architectures: Analog, Hybrid and Digital Combining (AC, HC and DC). Moreover, the specific power consumption figure of merit of ADCs varies significantly between different component designs in the literature, so that comparisons performed f… ▽ More

    Submitted 28 January, 2019; v1 submitted 30 November, 2018; originally announced November 2018.

    Comments: This is a self-archived pre-print version of a paper presented in European Wireless Conference 2017. arXiv admin note: substantial text overlap with arXiv:1607.03725

  35. arXiv:1808.09090  [pdf, other

    cs.CR

    Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening

    Authors: Aron Laszka, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon Koutsoukos

    Abstract: As the Industrial Internet of Things (IIot) becomes more prevalent in critical application domains, ensuring security and resilience in the face of cyber-attacks is becoming an issue of paramount importance. Cyber-attacks against critical infrastructures, for example, against smart water-distribution and transportation systems, pose serious threats to public health and safety. Owing to the severit… ▽ More

    Submitted 27 August, 2018; originally announced August 2018.

  36. arXiv:1808.08349  [pdf, other

    cs.CR cs.GT

    Detection and Mitigation of Attacks on Transportation Networks as a Multi-Stage Security Game

    Authors: Aron Laszka, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon Koutsoukos

    Abstract: In recent years, state-of-the-art traffic-control devices have evolved from standalone hardware to networked smart devices. Smart traffic control enables operators to decrease traffic congestion and environmental impact by acquiring real-time traffic data and changing traffic signals from fixed to adaptive schedules. However, these capabilities have inadvertently exposed traffic control to a wide… ▽ More

    Submitted 2 August, 2019; v1 submitted 24 August, 2018; originally announced August 2018.

  37. arXiv:1801.10472  [pdf, other

    cs.SE cs.NE

    Soft Computing Techniques for Dependable Cyber-Physical Systems

    Authors: Muhammad Atif, Siddique Latif, Rizwan Ahmad, Adnan Khalid Kiani, Junaid Qadir, Adeel Baig, Hisao Ishibuchi, Waseem Abbas

    Abstract: Cyber-Physical Systems (CPS) allow us to manipulate objects in the physical world by providing a communication bridge between computation and actuation elements. In the current scheme of things, this sought-after control is marred by limitations inherent in the underlying communication network(s) as well as by the uncertainty found in the physical world. These limitations hamper fine-grained contr… ▽ More

    Submitted 27 July, 2020; v1 submitted 25 January, 2018; originally announced January 2018.

    Comments: IEEE Access

  38. arXiv:1610.09546  [pdf, ps, other

    cs.IT

    Bit Allocation for Increased Power Efficiency in 5G Receivers with Variable-Resolution ADCs

    Authors: Waqas bin Abbas, Felipe Gomez-Cuba, Michele Zorzi

    Abstract: In future high-capacity wireless systems based on mmWave or massive multiple input multiple output (MIMO), the power consumption of receiver Analog to Digital Converters (ADC) is a concern. Although hybrid or analog systems with fewer ADCs have been proposed, fully digital receivers with many lower resolution ADCs (and lower power) may be a more versatile solution. In this paper, focusing on an up… ▽ More

    Submitted 28 January, 2019; v1 submitted 29 October, 2016; originally announced October 2016.

  39. arXiv:1608.07329  [pdf, ps, other

    cs.NI

    Scheduling Resource-Bounded Monitoring Devices for Event Detection and Isolation in Networks

    Authors: Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos

    Abstract: In networked systems, monitoring devices such as sensors are typically deployed to monitor various target locations. Targets are the points in the physical space at which events of some interest, such as random faults or attacks, can occur. Most often, these devices have limited energy supplies, and they can operate for a limited duration. As a result, energy-efficient monitoring of various target… ▽ More

    Submitted 25 August, 2016; originally announced August 2016.

  40. arXiv:1608.04309  [pdf, other

    eess.SY cs.SI math.OC

    Graph Distances and Controllability of Networks

    Authors: A. Yasin Yazicioglu, Waseem Abbas, Magnus Egerstedt

    Abstract: In this technical note, we study the controllability of diffusively coupled networks from a graph theoretic perspective. We consider leader-follower networks, where the external control inputs are injected to only some of the agents, namely the leaders. Our main result relates the controllability of such systems to the graph distances between the agents. More specifically, we present a graph topol… ▽ More

    Submitted 15 August, 2016; originally announced August 2016.

    Comments: Accepted to the IEEE Transactions on Automatic Control

  41. arXiv:1607.03725  [pdf, ps, other

    cs.IT

    Millimeter Wave Receiver Efficiency: A Comprehensive Comparison of Beamforming Schemes with Low Resolution ADCs

    Authors: Waqas bin Abbas, Felipe Gomez-Cuba, Michele Zorzi

    Abstract: In this work, we study the achievable rate and the energy efficiency of Analog, Hybrid and Digital Combining (AC, HC and DC) for millimeter wave (mmW) receivers. We take into account the power consumption of all receiver components, not just Analog-to-Digital Converters (ADC), determine some practical limitations of beamforming in each architecture, and develop performance analysis charts that ena… ▽ More

    Submitted 20 February, 2020; v1 submitted 13 July, 2016; originally announced July 2016.

    Comments: 32 pages, 17 figures, 4 tables. Published in IEEE Transactions on Wireless Communications

  42. arXiv:1606.06707  [pdf, other

    cs.GT cs.CR eess.SY

    Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments

    Authors: Amin Ghafouri, Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos

    Abstract: In cyber-physical systems, malicious and resourceful attackers could penetrate the system through cyber means and cause significant physical damage. Consequently, detection of such attacks becomes integral towards making these systems resilient to attacks. To achieve this objective, intrusion detection systems (IDS) that are able to detect malicious behavior can be deployed. However, practical IDS… ▽ More

    Submitted 8 February, 2017; v1 submitted 21 June, 2016; originally announced June 2016.

    Comments: Decision and Game Theory for Security: 7th International Conference, GameSec 2016, New York, NY, USA

  43. arXiv:1606.06698  [pdf, other

    eess.SY cs.CR

    Vulnerability of Fixed-Time Control of Signalized Intersections to Cyber-Tampering

    Authors: Amin Ghafouri, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon Koutsoukos

    Abstract: Recent experimental studies have shown that traffic management systems are vulnerable to cyber-attacks on sensor data. This paper studies the vulnerability of fixed-time control of signalized intersections when sensors measuring traffic flow information are compromised and perturbed by an adversary. The problems are formulated by considering three malicious objectives: 1) worst-case network accumu… ▽ More

    Submitted 8 February, 2017; v1 submitted 21 June, 2016; originally announced June 2016.

    Journal ref: 9th International Symposium on Resilient Control Systems (ISRCS), Chicago, IL, pp. 130-135 (2016)

  44. arXiv:1605.01930  [pdf, ps, other

    cs.IT cs.NI

    Context Information Based Initial Cell Search for Millimeter Wave 5G Cellular Networks

    Authors: Waqas Bin Abbas, Michele Zorzi

    Abstract: Millimeter wave (mmWave) communication is envisioned as a cornerstone to fulfill the data rate requirements for fifth generation (5G) cellular networks. In mmWave communication, beamforming is considered as a key technology to combat the high path-loss, and unlike in conventional microwave communication, beamforming may be necessary even during initial access/cell search. Among the proposed beamfo… ▽ More

    Submitted 6 May, 2016; originally announced May 2016.

  45. arXiv:1605.00508  [pdf, ps, other

    cs.IT cs.NI

    Towards an Appropriate Beamforming Scheme for Initial Cell Discovery in mmW 5G Cellular Networks

    Authors: Waqas bin Abbas, Michele Zorzi

    Abstract: Beamforming is an essential requirement to combat high pathloss and to improve signal-to-noise ratio during initial cell discovery in future millimeter wave cellular networks. The choice of an appropriate beamforming is directly coupled with its energy consumption. The energy consumption is even of more concern at a battery limited mobile station (MS). In this work, we provide an energy consumptio… ▽ More

    Submitted 2 May, 2016; originally announced May 2016.

  46. arXiv:1604.05151  [pdf, ps, other

    cs.IT cs.NI

    Towards an Appropriate Receiver Beamforming Scheme for Millimeter Wave Communication: A Power Consumption Based Comparison

    Authors: Waqas Bin Abbas, Michele Zorzi

    Abstract: At millimeter wave (mmW) frequencies, beamforming and large antenna arrays are an essential requirement to combat the high path loss for mmW communication. Moreover, at these frequencies, very large bandwidths are available to fulfill the data rate requirements of future wireless networks. However, utilization of these large bandwidths and of large antenna arrays can result in a high power consump… ▽ More

    Submitted 18 April, 2016; originally announced April 2016.

    Comments: 6 pages

  47. arXiv:1507.07134  [pdf, other

    eess.SY

    Sensor placement for fault location identification in water networks: A minimum test cover approach

    Authors: Lina Sela Perelman, Waseem Abbas, Xenofon Koutsoukos, Saurabh Amin

    Abstract: This paper focuses on the optimal sensor placement problem for the identification of pipe failure locations in large-scale urban water systems. The problem involves selecting the minimum number of sensors such that every pipe failure can be uniquely localized. This problem can be viewed as a minimum test cover (MTC) problem, which is NP-hard. We consider two approaches to obtain approximate soluti… ▽ More

    Submitted 21 March, 2016; v1 submitted 25 July, 2015; originally announced July 2015.

  48. arXiv:1503.04473  [pdf, ps, other

    cs.DM cs.CR eess.SY

    Guarding Networks Through Heterogeneous Mobile Guards

    Authors: Waseem Abbas, Sajal Bhatia, Xenofon Koutsoukos

    Abstract: In this article, the issue of guarding multi-agent systems against a sequence of intruder attacks through mobile heterogeneous guards (guards with different ranges) is discussed. The article makes use of graph theoretic abstractions of such systems in which agents are the nodes of a graph and edges represent interconnections between agents. Guards represent specialized mobile agents on specific no… ▽ More

    Submitted 15 March, 2015; originally announced March 2015.

    Comments: American Control Conference, Chicago, IL, 2015

  49. Deploying robots with two sensors in $K_{1,6}$-free graphs

    Authors: Waseem Abbas, Magnus Egerstedt, Chun-Hung Liu, Robin Thomas, Peter Whalen

    Abstract: Let $G$ be a graph of minimum degree at least two with no induced subgraph isomorphic to $K_{1,6}$. We prove that if $G$ is not isomorphic to one of eight exceptional graphs, then it is possible to assign two-element subsets of $\{1,2,3,4,5\}$ to the vertices of $G$ in such a way that for every $i\in\{1,2,3,4,5\}$ and every vertex $v\in V(G)$ the label $i$ is assigned to $v$ or one of its neighbor… ▽ More

    Submitted 3 December, 2014; v1 submitted 25 August, 2013; originally announced August 2013.

    Journal ref: J. Graph Theory 82 (2016), 236-252

  50. A Tight Lower Bound on the Controllability of Networks with Multiple Leaders

    Authors: Ahmet Yasin Yazicioglu, Waseem Abbas, Magnus Egerstedt

    Abstract: In this paper we study the controllability of networked systems with static network topologies using tools from algebraic graph theory. Each agent in the network acts in a decentralized fashion by updating its state in accordance with a nearest-neighbor averaging rule, known as the consensus dynamics. In order to control the system, external control inputs are injected into the so called leader no… ▽ More

    Submitted 8 February, 2012; originally announced May 2012.