Skip to main content

Showing 1–13 of 13 results for author: Ghrayeb, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.09162  [pdf, other

    cs.IT eess.SP

    Theoretical and Experimental Assessment of Large Beam Codebook at mmWave Devices: How Much is Enough?

    Authors: Bora Bozkurt, Hasan Atalay Gunel, Mohaned Chraiti, Ibrahim Hokelek, Ali Gorcin, Ali Ghrayeb

    Abstract: Modern millimeter wave (mmWave) transceivers come with a large number of antennas, each of which can support thousands of phase shifter configurations. This capability enables beam sweeping with fine angular resolution, but results in large codebook sizes that can span more than six orders of magnitude. On the other hand, the mobility of user terminals and their randomly changing orientations requ… ▽ More

    Submitted 14 May, 2025; originally announced May 2025.

    Comments: 12 pages, 6 figures

  2. arXiv:2504.20912  [pdf, other

    cs.IT eess.SP

    On the Secrecy-Sensing Optimization of RIS-assisted Full-Duplex Integrated Sensing and Communication Network

    Authors: Elmehdi Illi, Ahmad Bazzi, Marwa Qaraqe, Ali Ghrayeb

    Abstract: Integrated sensing and communication (ISAC) has recently emerged as a viable technique for establishing sensing and communication using the same resources. Nonetheless, the operation of ISAC networks is often challenged by the absence of a direct link between the sensing node and the targets, and by the risk of disclosing confidential data to malicious targets when using the same signal for both t… ▽ More

    Submitted 29 April, 2025; originally announced April 2025.

    Comments: 13 pages, submitted for possible publication

  3. arXiv:2412.04349  [pdf, other

    cs.CR

    VMGuard: Reputation-Based Incentive Mechanism for Poisoning Attack Detection in Vehicular Metaverse

    Authors: Ismail Lotfi, Marwa Qaraqe, Ali Ghrayeb, Dusit Niyato

    Abstract: The vehicular Metaverse represents an emerging paradigm that merges vehicular communications with virtual environments, integrating real-world data to enhance in-vehicle services. However, this integration faces critical security challenges, particularly in the data collection layer where malicious sensing IoT (SIoT) devices can compromise service quality through data poisoning attacks. The securi… ▽ More

    Submitted 5 December, 2024; originally announced December 2024.

    Comments: submitted to IEEE TVT

  4. arXiv:2405.19355  [pdf, ps, other

    cs.CR cs.AI

    Enhancing Trust and Security in the Vehicular Metaverse: A Reputation-Based Mechanism for Participants with Moral Hazard

    Authors: Ismail Lotfi, Marwa Qaraqe, Ali Ghrayeb, Niyato Dusit

    Abstract: In this paper, we tackle the issue of moral hazard within the realm of the vehicular Metaverse. A pivotal facilitator of the vehicular Metaverse is the effective orchestration of its market elements, primarily comprised of sensing internet of things (SIoT) devices. These SIoT devices play a critical role by furnishing the virtual service provider (VSP) with real-time sensing data, allowing for the… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

    Comments: Accepted in WCNC 2024

  5. arXiv:2203.13100  [pdf, other

    cs.IT eess.SP

    On Optimizing the Power Allocation and the Decoding Order in Uplink Cooperative NOMA

    Authors: Mohamed Elhattab, Mohamed Amine Arfaoui, Chadi Assi, Ali Ghrayeb, Marwa Qaraqe

    Abstract: In this paper, we investigate for the first time the dynamic power allocation and decoding order at the base station (BS) of two-user uplink (UL) cooperative non-orthogonal multiple access (C-NOMA)-based cellular networks. In doing so, we formulate a joint optimization problem aiming at maximizing the minimum user achievable rate, which is a non-convex optimization problem and hard to be directly… ▽ More

    Submitted 24 March, 2022; originally announced March 2022.

  6. arXiv:2002.06120  [pdf, other

    eess.SP cs.IT

    A Low-Complexity Framework for Joint User Pairing and Power Control for Cooperative NOMA in 5G and Beyond Cellular Networks

    Authors: Phuc Dinh, Mohamed Amine Arfaoui, Sanaa Sharafeddine, Chadi Assi, Ali Ghrayeb

    Abstract: This paper investigates the performance of cooperative non-orthogonal multiple access (C-NOMA) in a cellular downlink system. The system model consists of a base station (BS) serving multiple users, where users with good channel quality can assist the transmissions between the BS and users with poor channel quality through either half-duplex (HD) or full-duplex (FD) device-to-device (D2D) communic… ▽ More

    Submitted 14 February, 2020; originally announced February 2020.

  7. arXiv:1912.12406  [pdf, ps, other

    cs.IT cs.LG cs.NI

    Beamforming Learning for mmWave Communication: Theory and Experimental Validation

    Authors: ohaned Chraiti, Dmitry Chizhik, Jinfeng Du, Reinaldo A. Valenzuela, Ali Ghrayeb, Chadi Assi

    Abstract: To establish reliable and long-range millimeter-wave (mmWave) communication, beamforming is deemed to be a promising solution. Although beamforming can be done in the digital and analog domains, both approaches are hindered by several constraints when it comes to mmWave communications. For example, performing fully digital beamforming in mmWave systems involves using many radio frequency (RF) chai… ▽ More

    Submitted 28 December, 2019; originally announced December 2019.

  8. arXiv:1701.04371  [pdf, ps, other

    cs.CR cs.IT

    On the Achievable Secrecy Diversity of Cooperative Networks with Untrusted Relays

    Authors: Mohaned Chraiti, Ali Ghrayeb, Chadi Assi, Mazen O. Hasna

    Abstract: Cooperative relaying is often deployed to enhance the communication reliability (i.e., diversity order) and consequently the end-to-end achievable rate. However, this raises several security concerns when the relays are untrusted since they may have access to the relayed message. In this paper, we study the achievable secrecy diversity order of cooperative networks with untrusted relays. In partic… ▽ More

    Submitted 12 January, 2017; originally announced January 2017.

  9. arXiv:1606.06021  [pdf, ps, other

    cs.IT

    Nonlinear Interference Alignment in a One-dimensional Space

    Authors: Mohaned Chraiti, Ali Ghrayeb, Chadi Assi

    Abstract: Real interference alignment is efficient in breaking-up a one-dimensional space over time-invariant channels into fractional dimensions. As such, multiple symbols can be simultaneously transmitted with fractional degrees-of-freedom (DoF). Of particular interest is when the one dimensional space is partitioned into two fractional dimensions. In such scenario, the interfering signals are confined to… ▽ More

    Submitted 5 August, 2016; v1 submitted 20 June, 2016; originally announced June 2016.

  10. arXiv:1605.03244  [pdf, ps, other

    cs.IT

    A Stochastic Geometric Analysis of Device-to-Device Communications Operating over Generalized Fading Channels

    Authors: Young Jin Chun, Simon L. Cotton, Harpreet S. Dhillon, Ali Ghrayeb, Mazen O. Hasna

    Abstract: Device-to-device (D2D) communications are now considered as an integral part of future 5G networks which will enable direct communication between user equipment (UE) without unnecessary routing via the network infrastructure. This architecture will result in higher throughputs than conventional cellular networks, but with the increased potential for co-channel interference induced by randomly loca… ▽ More

    Submitted 10 May, 2016; originally announced May 2016.

    Comments: Submitted to IEEE Transactions on Wireless Communications

  11. arXiv:1507.00522  [pdf, ps, other

    cs.IT

    A Stochastic Geometry Based Approach to Modeling Interference Correlation in Cooperative Relay Networks

    Authors: Young Jin Chun, Simon L. Cotton, Mazen O. Hasna, Ali Ghrayeb

    Abstract: Future wireless networks are expected to be a convergence of many diverse network technologies and architectures, such as cellular networks, wireless local area networks, sensor networks, and device to device communications. Through cooperation between dissimilar wireless devices, this new combined network topology promises to unlock ever larger data rates and provide truly ubiquitous coverage for… ▽ More

    Submitted 2 July, 2015; originally announced July 2015.

    Comments: Submitted to IEEE Transactions on Wireless Communications

  12. arXiv:1506.06296  [pdf, ps, other

    cs.IT cs.NI

    On Modeling Heterogeneous Wireless Networks Using Non-Poisson Point Processes

    Authors: Young Jin Chun, Mazen Omar Hasna, Ali Ghrayeb, Marco Di Renzo

    Abstract: Future wireless networks are required to support 1000 times higher data rate, than the current LTE standard. In order to meet the ever increasing demand, it is inevitable that, future wireless networks will have to develop seamless interconnection between multiple technologies. A manifestation of this idea is the collaboration among different types of network tiers such as macro and small cells, l… ▽ More

    Submitted 20 June, 2015; originally announced June 2015.

    Comments: Submitted to IEEE Communications Magazine

  13. arXiv:0809.2315  [pdf, ps, other

    cs.IT cs.DM math.RA

    On the Construction of Skew Quasi-Cyclic Codes

    Authors: Taher Abualrub, Ali Ghrayeb, Nuh Aydin, Irfan Siap

    Abstract: In this paper we study a special type of quasi-cyclic (QC) codes called skew QC codes. This set of codes is constructed using a non-commutative ring called the skew polynomial rings $F[x;θ]$. After a brief description of the skew polynomial ring $F[x;θ]$ it is shown that skew QC codes are left submodules of the ring $R_{s}^{l}=(F[x;θ]/(x^{s}-1))^{l}.$ The notions of generator and parity-check po… ▽ More

    Submitted 13 September, 2008; originally announced September 2008.

    Comments: 12 pages. submitted