Skip to main content

Showing 1–8 of 8 results for author: Cherkaoui, S

Searching in archive eess. Search in all archives.
.
  1. arXiv:2507.06997  [pdf, ps, other

    eess.SP cs.ET cs.LG cs.NI

    Federated Learning-based MARL for Strengthening Physical-Layer Security in B5G Networks

    Authors: Deemah H. Tashman, Soumaya Cherkaoui, Walaa Hamouda

    Abstract: This paper explores the application of a federated learning-based multi-agent reinforcement learning (MARL) strategy to enhance physical-layer security (PLS) in a multi-cellular network within the context of beyond 5G networks. At each cell, a base station (BS) operates as a deep reinforcement learning (DRL) agent that interacts with the surrounding environment to maximize the secrecy rate of legi… ▽ More

    Submitted 9 July, 2025; originally announced July 2025.

  2. arXiv:2507.06983  [pdf, ps, other

    cs.ET cs.NI eess.SP

    Maximizing Reliability in Overlay Radio Networks with Time Switching and Power Splitting Energy Harvesting

    Authors: Deemah H. Tashman, Soumaya Cherkaoui, Walaa Hamouda

    Abstract: Cognitive radio networks (CRNs) are acknowledged for their ability to tackle the issue of spectrum under-utilization. In the realm of CRNs, this paper investigates the energy efficiency issue and addresses the critical challenge of optimizing system reliability for overlay CRN access mode. Randomly dispersed secondary users (SUs) serving as relays for primary users (PUs) are considered, in which o… ▽ More

    Submitted 9 July, 2025; originally announced July 2025.

  3. arXiv:2507.06981  [pdf, ps, other

    cs.ET cs.NI eess.SP

    Optimizing Cognitive Networks: Reinforcement Learning Meets Energy Harvesting Over Cascaded Channels

    Authors: Deemah H. Tashman, Soumaya Cherkaoui, Walaa Hamouda

    Abstract: This paper presents a reinforcement learning (RL) based approach to improve the physical layer security (PLS) of an underlay cognitive radio network (CRN) over cascaded channels. These channels are utilized in highly mobile networks such as cognitive vehicular networks (CVN). In addition, an eavesdropper aims to intercept the communications between secondary users (SUs). The SU receiver has full-d… ▽ More

    Submitted 9 July, 2025; originally announced July 2025.

  4. arXiv:2505.14581  [pdf, ps, other

    eess.SP cs.LG

    Performance Optimization of Energy-Harvesting Underlay Cognitive Radio Networks Using Reinforcement Learning

    Authors: Deemah H. Tashman, Soumaya Cherkaoui, Walaa Hamouda

    Abstract: In this paper, a reinforcement learning technique is employed to maximize the performance of a cognitive radio network (CRN). In the presence of primary users (PUs), it is presumed that two secondary users (SUs) access the licensed band within underlay mode. In addition, the SU transmitter is assumed to be an energy-constrained device that requires harvesting energy in order to transmit signals to… ▽ More

    Submitted 20 May, 2025; originally announced May 2025.

  5. arXiv:2202.06439  [pdf, other

    cs.NI eess.SP

    Communication and Computation O-RAN Resource Slicing for URLLC Services Using Deep Reinforcement Learning

    Authors: Abderrahime Filali, Boubakr Nour, Soumaya Cherkaoui, Abdellatif Kobbane

    Abstract: The evolution of the future beyond-5G/6G networks towards a service-aware network is based on network slicing technology. With network slicing, communication service providers seek to meet all the requirements imposed by the verticals, including ultra-reliable low-latency communication (URLLC) services. In addition, the open radio access network (O-RAN) architecture paves the way for flexible shar… ▽ More

    Submitted 13 February, 2022; originally announced February 2022.

  6. Competitive Algorithms and Reinforcement Learning for NOMA in IoT Networks

    Authors: Zoubeir Mlika, Soumaya Cherkaoui

    Abstract: This paper studies the problem of massive Internet of things (IoT) access in beyond fifth generation (B5G) networks using non-orthogonal multiple access (NOMA) technique. The problem involves massive IoT devices grouping and power allocation in order to respect the low latency as well as the limited operating energy of the IoT devices. The considered objective function, maximizing the number of su… ▽ More

    Submitted 28 January, 2022; originally announced January 2022.

    Comments: arXiv admin note: text overlap with arXiv:2002.07957

    Journal ref: Published in: ICC 2021 - IEEE International Conference on Communications

  7. Network Slicing with MEC and Deep Reinforcement Learning for the Internet of Vehicles

    Authors: Zoubeir Mlika, Soumaya Cherkaoui

    Abstract: The interconnection of vehicles in the future fifth generation (5G) wireless ecosystem forms the so-called Internet of vehicles (IoV). IoV offers new kinds of applications requiring delay-sensitive, compute-intensive and bandwidth-hungry services. Mobile edge computing (MEC) and network slicing (NS) are two of the key enabler technologies in 5G networks that can be used to optimize the allocation… ▽ More

    Submitted 26 January, 2022; originally announced January 2022.

    Journal ref: Published in: IEEE Network ( Volume: 35, Issue: 3, May/June 2021)

  8. arXiv:2104.03169  [pdf, ps, other

    eess.SP cs.AI cs.NI

    Empowering Prosumer Communities in Smart Grid with Wireless Communications and Federated Edge Learning

    Authors: Afaf Taik, Boubakr Nour, Soumaya Cherkaoui

    Abstract: The exponential growth of distributed energy resources is enabling the transformation of traditional consumers in the smart grid into prosumers. Such transition presents a promising opportunity for sustainable energy trading. Yet, the integration of prosumers in the energy market imposes new considerations in designing unified and sustainable frameworks for efficient use of the power and communica… ▽ More

    Submitted 28 January, 2022; v1 submitted 7 April, 2021; originally announced April 2021.