Skip to main content

Showing 1–25 of 25 results for author: Krunz, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2410.19795  [pdf, other

    cs.DC cs.NI

    SANSee: A Physical-layer Semantic-aware Networking Framework for Distributed Wireless Sensing

    Authors: Huixiang Zhu, Yong Xiao, Yingyu Li, Guangming Shi, Marwan Krunz

    Abstract: Contactless device-free wireless sensing has recently attracted significant interest due to its potential to support a wide range of immersive human-machine interactive applications using ubiquitously available radio frequency (RF) signals. Traditional approaches focus on developing a single global model based on a combined dataset collected from different locations. However, wireless signals are… ▽ More

    Submitted 15 October, 2024; originally announced October 2024.

    Comments: accepted at IEEE Transactions on Mobile Computing

  2. arXiv:2410.06339  [pdf, other

    cs.LG cs.CR cs.IT cs.NI eess.SP

    Filtered Randomized Smoothing: A New Defense for Robust Modulation Classification

    Authors: Wenhan Zhang, Meiyu Zhong, Ravi Tandon, Marwan Krunz

    Abstract: Deep Neural Network (DNN) based classifiers have recently been used for the modulation classification of RF signals. These classifiers have shown impressive performance gains relative to conventional methods, however, they are vulnerable to imperceptible (low-power) adversarial attacks. Some of the prominent defense approaches include adversarial training (AT) and randomized smoothing (RS). While… ▽ More

    Submitted 8 October, 2024; originally announced October 2024.

    Comments: IEEE Milcom 2024

  3. arXiv:2312.07011  [pdf, other

    cs.IT eess.SP

    Securing MIMO Wiretap Channel with Learning-Based Friendly Jamming under Imperfect CSI

    Authors: Bui Minh Tuan, Diep N. Nguyen, Nguyen Linh Trung, Van-Dinh Nguyen, Nguyen Van Huynh, Dinh Thai Hoang, Marwan Krunz, Eryk Dutkiewicz

    Abstract: Wireless communications are particularly vulnerable to eavesdropping attacks due to their broadcast nature. To effectively deal with eavesdroppers, existing security techniques usually require accurate channel state information (CSI), e.g., for friendly jamming (FJ), and/or additional computing resources at transceivers, e.g., cryptography-based solutions, which unfortunately may not be feasible i… ▽ More

    Submitted 27 October, 2024; v1 submitted 12 December, 2023; originally announced December 2023.

    Comments: 12 pages, 15 figures

  4. arXiv:2308.10584  [pdf, other

    cs.LG cs.NI eess.SP

    RADIANCE: Radio-Frequency Adversarial Deep-learning Inference for Automated Network Coverage Estimation

    Authors: Sopan Sarkar, Mohammad Hossein Manshaei, Marwan Krunz

    Abstract: Radio-frequency coverage maps (RF maps) are extensively utilized in wireless networks for capacity planning, placement of access points and base stations, localization, and coverage estimation. Conducting site surveys to obtain RF maps is labor-intensive and sometimes not feasible. In this paper, we propose radio-frequency adversarial deep-learning inference for automated network coverage estimati… ▽ More

    Submitted 21 August, 2023; originally announced August 2023.

    Comments: 6 pages, 6 figures

  5. arXiv:2302.00207  [pdf, other

    cs.LG cs.DC cs.NI

    Distributed Traffic Synthesis and Classification in Edge Networks: A Federated Self-supervised Learning Approach

    Authors: Yong Xiao, Rong Xia, Yingyu Li, Guangming Shi, Diep N. Nguyen, Dinh Thai Hoang, Dusit Niyato, Marwan Krunz

    Abstract: With the rising demand for wireless services and increased awareness of the need for data protection, existing network traffic analysis and management architectures are facing unprecedented challenges in classifying and synthesizing the increasingly diverse services and applications. This paper proposes FS-GAN, a federated self-supervised learning framework to support automatic traffic analysis an… ▽ More

    Submitted 31 January, 2023; originally announced February 2023.

    Comments: published as early access at IEEE Transactions on Mobile Computing, January 2023

  6. Time-sensitive Learning for Heterogeneous Federated Edge Intelligence

    Authors: Yong Xiao, Xiaohan Zhang, Guangming Shi, Marwan Krunz, Diep N. Nguyen, Dinh Thai Hoang

    Abstract: Real-time machine learning has recently attracted significant interest due to its potential to support instantaneous learning, adaptation, and decision making in a wide range of application domains, including self-driving vehicles, intelligent transportation, and industry automation. We investigate real-time ML in a federated edge intelligence (FEI) system, an edge computing system that implements… ▽ More

    Submitted 26 January, 2023; originally announced January 2023.

    Comments: IEEE Link: https://ieeexplore.ieee.org/document/10018200

    Journal ref: IEEE Transactions on Mobile Computing, January 2023

  7. arXiv:2211.07166  [pdf, other

    cs.LG cs.CR cs.DC

    Optimal Privacy Preserving for Federated Learning in Mobile Edge Computing

    Authors: Hai M. Nguyen, Nam H. Chu, Diep N. Nguyen, Dinh Thai Hoang, Van-Dinh Nguyen, Minh Hoang Ha, Eryk Dutkiewicz, Marwan Krunz

    Abstract: Federated Learning (FL) with quantization and deliberately added noise over wireless networks is a promising approach to preserve user differential privacy (DP) while reducing wireless resources. Specifically, an FL process can be fused with quantized Binomial mechanism-based updates contributed by multiple users. However, optimizing quantization parameters, communication resources (e.g., transmit… ▽ More

    Submitted 20 May, 2023; v1 submitted 14 November, 2022; originally announced November 2022.

    Comments: 16 pages, 10 figures

  8. Automatic Machine Learning for Multi-Receiver CNN Technology Classifiers

    Authors: Amir-Hossein Yazdani-Abyaneh, Marwan Krunz

    Abstract: Convolutional Neural Networks (CNNs) are one of the most studied family of deep learning models for signal classification, including modulation, technology, detection, and identification. In this work, we focus on technology classification based on raw I/Q samples collected from multiple synchronized receivers. As an example use case, we study protocol identification of Wi-Fi, LTE-LAA, and 5G NR-U… ▽ More

    Submitted 28 April, 2022; originally announced April 2022.

    Comments: To appear in Proceedings of ACM Workshop on Wireless Security and Machine Learning (WiseML) 2022

  9. arXiv:2108.13560  [pdf, other

    cs.NI cs.MA eess.SP eess.SY

    CWmin Estimation and Collision Identification in Wi-Fi Systems

    Authors: Amir-Hossein Yazdani-Abyaneh, Marwan Krunz

    Abstract: Wi-Fi networks are susceptible to aggressive behavior caused by selfish or malicious devices that reduce their minimum contention window size (CWmin) to below the standard CWmin. In this paper, we propose a scheme called Minimum Contention Window Estimation (CWE) to detect aggressive stations with low CWmin's, where the AP estimates the CWmin value of all stations transmitting uplink by monitoring… ▽ More

    Submitted 30 August, 2021; originally announced August 2021.

    Comments: Accepted to appear in proceedings of IEEE MASS 2021

  10. arXiv:2106.15477  [pdf, other

    cs.NI

    AdaptiveFog: A Modelling and Optimization Framework for Fog Computing in Intelligent Transportation Systems

    Authors: Yong Xiao, Marwan Krunz

    Abstract: Fog computing has been advocated as an enabling technology for computationally intensive services in smart connected vehicles. Most existing works focus on analyzing the queueing and workload processing latencies associated with fog computing, ignoring the fact that wireless access latency can sometimes dominate the overall latency. This motivates the work in this paper, where we report on a five-… ▽ More

    Submitted 29 June, 2021; originally announced June 2021.

    Comments: accepted at IEEE Transactions on Mobile Computing

  11. arXiv:2106.06976  [pdf, other

    cs.LG cs.AI cs.GT

    Game of GANs: Game-Theoretical Models for Generative Adversarial Networks

    Authors: Monireh Mohebbi Moghadam, Bahar Boroomand, Mohammad Jalali, Arman Zareian, Alireza DaeiJavad, Mohammad Hossein Manshaei, Marwan Krunz

    Abstract: Generative Adversarial Networks (GANs) have recently attracted considerable attention in the AI community due to its ability to generate high-quality data of significant statistical resemblance to real data. Fundamentally, GAN is a game between two neural networks trained in an adversarial manner to reach a zero-sum Nash equilibrium profile. Despite the improvement accomplished in GANs in the last… ▽ More

    Submitted 3 January, 2022; v1 submitted 13 June, 2021; originally announced June 2021.

    Comments: 18 pages, 5 Tables, 6 Figures, Review paper

  12. arXiv:2105.12834  [pdf, ps, other

    cs.NI

    Sense-Bandits: AI-based Adaptation of Sensing Thresholds for Heterogeneous-technology Coexistence Over Unlicensed Bands

    Authors: Mohammed Hirzallah, Marwan Krunz

    Abstract: In this paper, we present Sense-Bandits, an AI-based framework for distributed adaptation of the sensing thresholds (STs) over shared spectrum. This framework specifically targets the coexistence of heterogenous technologies, e.g., Wi-Fi, 4G Licensed-Assisted Access (LAA), and 5G New Radio Unlicensed (NR-U), over unlicensed channels. To access the channel, a device compares the measured power with… ▽ More

    Submitted 10 May, 2021; originally announced May 2021.

    Comments: ICCCN 2021

  13. arXiv:2104.02776  [pdf, other

    cs.NI

    Misbehavior Detection in Wi-Fi/LTE Coexistence over Unlicensed Bands

    Authors: Islam Samy, Xiao Han, Loukas Lazos, Ming Li, Yong Xiao, Marwan Krunz

    Abstract: We consider the problem of fair coexistence between LTE and Wi-Fi systems in the unlicensed 5 GHz U-NII bands. We focus on the misbehavior opportunities due to the heterogeneity in channel access mechanism and the lack of a common control plane. We define selfish misbehavior strategies for the LTE that yield an unfair share of the spectrum resources. Such strategies are based on manipulating the o… ▽ More

    Submitted 6 April, 2021; originally announced April 2021.

  14. 5G New Radio Unlicensed: Challenges and Evaluation

    Authors: Mohammed Hirzallah, Marwan Krunz, Balkan Kecicioglu, Belal Hamzeh

    Abstract: To meet the high demand for mobile data, the Third Generation Partnership Project (3GPP) established a set of standards known as 5G New Radio (5G NR). The architecture of 5G NR includes a flexible radio access network and a core network. 3GPP has also been working on a new radio access technology, called 5G NR Unlicensed (5G NR-U), which aims at extending 5G NR to unlicensed bands. In this paper,… ▽ More

    Submitted 20 December, 2020; originally announced December 2020.

    Comments: in IEEE Transactions on Cognitive Communications and Networking, 2020

    Report number: Report-no: UoA-ECE-20-01

  15. arXiv:2004.13563  [pdf, other

    eess.SP cs.LG cs.NI

    Towards Ubiquitous AI in 6G with Federated Learning

    Authors: Yong Xiao, Guangming Shi, Marwan Krunz

    Abstract: With 5G cellular systems being actively deployed worldwide, the research community has started to explore novel technological advances for the subsequent generation, i.e., 6G. It is commonly believed that 6G will be built on a new vision of ubiquitous AI, an hyper-flexible architecture that brings human-like intelligence into every aspect of networking systems. Despite its great promise, there are… ▽ More

    Submitted 26 April, 2020; originally announced April 2020.

    Comments: Submitted to IEEE Communication Magazine

  16. arXiv:2003.07004  [pdf, ps, other

    eess.SP cs.LG

    A Generative Learning Approach for Spatio-temporal Modeling in Connected Vehicular Network

    Authors: Rong Xia, Yong Xiao, Yingyu Li, Marwan Krunz, Dusit Niyato

    Abstract: Spatio-temporal modeling of wireless access latency is of great importance for connected-vehicular systems. The quality of the molded results rely heavily on the number and quality of samples which can vary significantly due to the sensor deployment density as well as traffic volume and density. This paper proposes LaMI (Latency Model Inpainting), a novel framework to generate a comprehensive spat… ▽ More

    Submitted 15 March, 2020; originally announced March 2020.

    Comments: 6 pages, 8 figures. Accepted at IEEE International Conference on Communications (ICC), Dublin, Ireland, June 2020

  17. arXiv:2001.10300  [pdf, other

    cs.NI cs.DC eess.SP

    Dynamic Network Slicing for Scalable Fog Computing Systems with Energy Harvesting

    Authors: Yong Xiao, Marwan Krunz

    Abstract: This paper studies fog computing systems, in which cloud data centers can be supplemented by a large number of fog nodes deployed in a wide geographical area. Each node relies on harvested energy from the surrounding environment to provide computational services to local users. We propose the concept of dynamic network slicing in which a regional orchestrator coordinates workload distribution amon… ▽ More

    Submitted 28 January, 2020; originally announced January 2020.

    Journal ref: Published at IEEE Journal on Selected Areas in Communications, vol. 36, no. 12, pp. 2640 - 2654, December 2018

  18. arXiv:2001.10296  [pdf, other

    cs.NI cs.IT eess.SY

    Distributed Resource Allocation for Network Slicing over Licensed and Unlicensed Bands

    Authors: Yong Xiao, Mohammed Hirzallah, Marwan Krunz

    Abstract: Network slicing is considered one of the key enabling technologies for 5G due to its ability to customize and "slice" a common resource to support diverse services and verticals.This paper introduces a novel inter-operator network slicing framework in which multiple mobile network operators (MNOs) can coordinate and jointly slice their accessible spectrum resources in both licensed and unlicensed… ▽ More

    Submitted 28 January, 2020; originally announced January 2020.

    Journal ref: Published at IEEE Journal on Selected Areas in Communications, vol. 36, no. 10, pp. 2260 - 2274, October 2018

  19. Distributed Optimization for Energy-efficient Fog Computing in the Tactile Internet

    Authors: Yong Xiao, Marwan Krunz

    Abstract: Tactile Internet is an emerging concept that focuses on supporting high-fidelity, ultra-responsive, and widely available human-to-machine interactions. To reduce the transmission latency and alleviate Internet congestion, fog computing has been advocated as an important component of the Tactile Internet. In this paper, we focus on energy-efficient design of fog computing networks that support low-… ▽ More

    Submitted 28 January, 2020; originally announced January 2020.

    Journal ref: Published at IEEE Journal on Selected Areas in Communications, vol. 36, no. 11, pp. 2390 - 2400, November 2018

  20. arXiv:2001.09276  [pdf, other

    cs.NI cs.IT eess.SP

    Multi-operator Network Sharing for Massive IoT

    Authors: Yong Xiao, Marwan Krunz, Tao Shu

    Abstract: Recent study predicts that by 2020 up to 50 billion IoT devices will be connected to the Internet, straining the capacity of wireless network that has already been overloaded with data-hungry mobile applications, such as high-definition video streaming and virtual reality(VR)/augmented reality(AR). How to accommodate the demand for both massive scale of IoT devices and high-speed cellular services… ▽ More

    Submitted 25 January, 2020; originally announced January 2020.

    Comments: Published at IEEE Communication Magazine, vol. 57, no. 4, pp. 96-101, April 2019

    Journal ref: IEEE Communication Magazine, vol. 57, no. 4, pp. 96-101, April 2019

  21. Vulnerabilities of Massive MIMO Systems Against Pilot Contamination Attacks

    Authors: Berk Akgun, Marwan Krunz, O. Ozan Koyluoglu

    Abstract: We consider a single-cell massive MIMO system in which a base station (BS) with a large number of antennas transmits simultaneously to several single-antenna users in the presence of an attacker.The BS acquires the channel state information (CSI) based on uplink pilot transmissions. In this work, we demonstrate the vulnerability of CSI estimation phase to malicious attacks. For that purpose, we st… ▽ More

    Submitted 8 October, 2017; originally announced October 2017.

  22. Secure Transmissions Using Artificial Noise in MIMO Wiretap Interference Channel: A Game Theoretic Approach

    Authors: Peyman Siyari, Marwan Krunz, Diep N. Nguyen

    Abstract: We consider joint optimization of artificial noise (AN) and information signals in a MIMO wiretap interference network, wherein the transmission of each link may be overheard by several MIMO-capable eavesdroppers. Each information signal is accompanied with AN, generated by the same user to confuse nearby eavesdroppers. Using a noncooperative game, a distributed optimization mechanism is proposed… ▽ More

    Submitted 23 December, 2016; originally announced December 2016.

    Comments: 36 pages, 8 figures

  23. Exploiting Full-duplex Receivers for Achieving Secret Communications in Multiuser MISO Networks

    Authors: Berk Akgun, O. Ozan Koyluoglu, Marwan Krunz

    Abstract: We consider a broadcast channel, in which a multi-antenna transmitter (Alice) sends $K$ confidential information signals to $K$ legitimate users (Bobs) in the presence of $L$ eavesdroppers (Eves). Alice uses MIMO precoding to generate the information signals along with her own (Tx-based) friendly jamming. Interference at each Bob is removed by MIMO zero-forcing. This, however, leaves a "vulnerabil… ▽ More

    Submitted 9 January, 2017; v1 submitted 6 April, 2016; originally announced April 2016.

    Comments: IEEE Transactions on Communications

  24. arXiv:1603.06507  [pdf, other

    cs.NI

    Energy-Aware Cooperative Wireless Networks with Multiple Cognitive Users

    Authors: Mahmoud Ashour, M. Majid Butt, Amr Mohamed, Tamer ElBatt, Marwan Krunz

    Abstract: In this paper, we study and analyze cooperative cognitive radio networks with arbitrary number of secondary users (SUs). Each SU is considered a prospective relay for the primary user (PU) besides having its own data transmission demand. We consider a multi-packet transmission framework which allows multiple SUs to transmit simultaneously thanks to dirty-paper coding. We propose power allocation a… ▽ More

    Submitted 21 March, 2016; originally announced March 2016.

  25. arXiv:1305.6003  [pdf, ps, other

    cs.NI cs.IT math.OC

    Exploiting Self-Interference Suppression for Improved Spectrum Awareness/Efficiency in Cognitive Radio Systems

    Authors: Wessam Afifi, Marwan Krunz

    Abstract: Inspired by recent developments in full-duplex communications, we propose and study new modes of operation for cognitive radios with the goal of achieving improved primary user (PU) detection and/or secondary user (SU) throughput. Specifically, we consider an opportunistic PU/SU setting in which the SU is equipped with partial/complete self-interference suppression (SIS), enabling it to transmit a… ▽ More

    Submitted 26 May, 2013; originally announced May 2013.

    Comments: 9 pages, 12 figures, In Proceedings of the IEEE INFOCOM 2013 Main-Conference