Skip to main content

Showing 1–19 of 19 results for author: Abbas, R

.
  1. arXiv:2202.00005  [pdf

    cs.CR cs.LG

    5G enabled Mobile Edge Computing security for Autonomous Vehicles

    Authors: Daryll Ralph D'Costa, Dr. Robert Abbas

    Abstract: The world is moving into a new era with the deployment of 5G communication infrastructure. Many new developments are deployed centred around this technology. One such advancement is 5G Vehicle to Everything communication. This technology can be used for applications such as driverless delivery of goods, immediate response to emergencies and improving traffic efficiency. The concept of Intelligent… ▽ More

    Submitted 30 January, 2022; originally announced February 2022.

    Comments: 9 pages, 8 figures

  2. arXiv:2104.02832  [pdf, other

    cs.CV

    ARC: A Vision-based Automatic Retail Checkout System

    Authors: Syed Talha Bukhari, Abdul Wahab Amin, Muhammad Abdullah Naveed, Muhammad Rzi Abbas

    Abstract: Retail checkout systems employed at supermarkets primarily rely on barcode scanners, with some utilizing QR codes, to identify the items being purchased. These methods are time-consuming in practice, require a certain level of human supervision, and involve waiting in long queues. In this regard, we propose a system, that we call ARC, which aims at making the process of check-out at retail store c… ▽ More

    Submitted 17 May, 2021; v1 submitted 6 April, 2021; originally announced April 2021.

    Comments: Work was done during the academic year 2017-2018 as a Senior Year (undergraduate) Project (thesis)

  3. arXiv:2104.02231  [pdf, other

    cs.LG

    IoT Security: Botnet detection in IoT using Machine learning

    Authors: Satish Pokhrel, Robert Abbas, Bhulok Aryal

    Abstract: The acceptance of Internet of Things (IoT) applications and services has seen an enormous rise of interest in IoT. Organizations have begun to create various IoT based gadgets ranging from small personal devices such as a smart watch to a whole network of smart grid, smart mining, smart manufacturing, and autonomous driver-less vehicles. The overwhelming amount and ubiquitous presence have attract… ▽ More

    Submitted 5 April, 2021; originally announced April 2021.

    Comments: 11 pages, 23 figures

  4. arXiv:2103.02690  [pdf, other

    cs.CV

    A comprehensive survey on point cloud registration

    Authors: Xiaoshui Huang, Guofeng Mei, Jian Zhang, Rana Abbas

    Abstract: Registration is a transformation estimation problem between two point clouds, which has a unique and critical role in numerous computer vision applications. The developments of optimization-based methods and deep learning methods have improved registration robustness and efficiency. Recently, the combinations of optimization-based and deep learning methods have further improved performance. Howeve… ▽ More

    Submitted 5 March, 2021; v1 submitted 3 March, 2021; originally announced March 2021.

    Comments: review paper

  5. arXiv:2102.01881  [pdf, ps, other

    cs.IT

    Analysis and Design of Analog Fountain Codes for Short Packet Communications

    Authors: Wen Jun Lim, Rana Abbas, Yonghui Li, Branka Vucetic, Mahyar Shirvanimoghaddam

    Abstract: In this paper, we focus on the design and analysis of the Analog Fountain Code (AFC) for short packet communications. We first propose a density evolution (DE) based framework, which tracks the evolution of the probability density function of the messages exchanged between variable and check nodes of AFC in the belief propagation decoder. Using the proposed DE framework, we formulate an optimisati… ▽ More

    Submitted 14 October, 2021; v1 submitted 3 February, 2021; originally announced February 2021.

    Comments: 13 pages, 15 figures

  6. arXiv:2007.10826  [pdf, ps, other

    cs.IT eess.SP

    Ratio of Products of Mixture Gamma Variates with Applications to Wireless Communications

    Authors: Hussien Al-Hmood, Rafed Sabbar Abbas, H. S. Al-Raweshidy

    Abstract: In this paper, the statistical properties of the product of independent and non-identically distributed mixture Gamma (MG) random variables (RVs) are provided first. Specifically, simple exact closed-form expressions for the probability density function (PDF), cumulative distribution function (CDF), and moment generating function (MGF) are derived in terms of univariate Meijer's $G$-function. The… ▽ More

    Submitted 17 July, 2020; originally announced July 2020.

    Comments: 11 pages, 8 figures

  7. arXiv:2004.13875  [pdf, other

    cs.IT eess.SP

    6G White Paper on Machine Learning in Wireless Communication Networks

    Authors: Samad Ali, Walid Saad, Nandana Rajatheva, Kapseok Chang, Daniel Steinbach, Benjamin Sliwa, Christian Wietfeld, Kai Mei, Hamid Shiri, Hans-Jürgen Zepernick, Thi My Chinh Chu, Ijaz Ahmad, Jyrki Huusko, Jaakko Suutala, Shubhangi Bhadauria, Vimal Bhatia, Rangeet Mitra, Saidhiraj Amuru, Robert Abbas, Baohua Shao, Michele Capobianco, Guanghui Yu, Maelick Claes, Teemu Karvonen, Mingzhe Chen , et al. (2 additional authors not shown)

    Abstract: The focus of this white paper is on machine learning (ML) in wireless communications. 6G wireless communication networks will be the backbone of the digital transformation of societies by providing ubiquitous, reliable, and near-instant wireless connectivity for humans and machines. Recent advances in ML research has led enable a wide range of novel technologies such as self-driving vehicles and v… ▽ More

    Submitted 28 April, 2020; originally announced April 2020.

  8. arXiv:2004.11665  [pdf

    cs.CR cs.NI

    6G White paper: Research challenges for Trust, Security and Privacy

    Authors: Mika Ylianttila, Raimo Kantola, Andrei Gurtov, Lozenzo Mucchi, Ian Oppermann, Zheng Yan, Tri Hong Nguyen, Fei Liu, Tharaka Hewa, Madhusanka Liyanage, Ahmad Ijaz, Juha Partala, Robert Abbas, Artur Hecker, Sara Jayousi, Alessio Martinelli, Stefano Caputo, Jonathan Bechtold, Ivan Morales, Andrei Stoica, Giuseppe Abreu, Shahriar Shahabuddin, Erdal Panayirci, Harald Haas, Tanesh Kumar , et al. (2 additional authors not shown)

    Abstract: The roles of trust, security and privacy are somewhat interconnected, but different facets of next generation networks. The challenges in creating a trustworthy 6G are multidisciplinary spanning technology, regulation, techno-economics, politics and ethics. This white paper addresses their fundamental research challenges in three key areas. Trust: Under the current "open internet" regulation, the… ▽ More

    Submitted 30 April, 2020; v1 submitted 24 April, 2020; originally announced April 2020.

  9. arXiv:2004.01561  [pdf, other

    cs.NI

    Campus Wi-Fi Coverage Map** and Analysis

    Authors: Farhana Binte Kamrul Easha, Robert Abbas, Matthew Daley

    Abstract: Wireless Local Area Networks (WLANs), known as Wi-Fi, have become an essential service in university environments that helps staff, students and guests to access connectivity to the Internet from their mobile devices. Apart from the Internet being a learning resource, students also submit their assignments online using web portals. Most campuses will have poor coverage areas for mobile networks an… ▽ More

    Submitted 3 April, 2020; originally announced April 2020.

    Comments: 7 pages, 12 figures

  10. arXiv:2003.10257  [pdf

    cs.IT eess.SP

    Grant-Free Non-Orthogonal Multiple Access: A Key Enabler for 6G-IoT

    Authors: Rana Abbas, Tao Huang, Basit Shahab, Mahyar Shirvanimoghaddam, Yonghui Li, Branka Vucetic

    Abstract: The proliferating number of devices with short payloads as well as low power budget has already driven researchers away from classical grant-based access schemes that are notorious for their large signalling overhead as well as power-consuming retransmissions. Instead, light-weight random access protocols have been re-investigated and their throughput has been improved in orders of magnitude with… ▽ More

    Submitted 23 March, 2020; originally announced March 2020.

  11. arXiv:2003.09574  [pdf, other

    eess.SP cs.NI

    5G Coverage, Prediction, and Trial Measurements

    Authors: Tristan Curry, Robert Abbas

    Abstract: When planning a 5G network in the sub-6GHz bands, similar cell planning techniques to LTE can be applied. Looking at the Australian environment, the n78 band (3.3-3.8GHz TDD) is approximately 1GHz higher than the 2.6GHz band used in existing LTE networks. As a result, the coverage footprint can be similar, and therefore co-locating 5G NR (New Radio) on existing LTE base stations is a common strate… ▽ More

    Submitted 21 March, 2020; originally announced March 2020.

    Comments: 4 pages, 7 Figures, 2 Tables. Paper Co-written by Tristan Curry and Robert Abbas, and edited by Tristan Curry

    ACM Class: C.2.1; C.2.2; C.4

  12. arXiv:2003.03474  [pdf, other

    cs.CR cs.LG stat.ML

    Machine Learning based Anomaly Detection for 5G Networks

    Authors: Jordan Lam, Robert Abbas

    Abstract: Protecting the networks of tomorrow is set to be a challenging domain due to increasing cyber security threats and widening attack surfaces created by the Internet of Things (IoT), increased network heterogeneity, increased use of virtualisation technologies and distributed architectures. This paper proposes SDS (Software Defined Security) as a means to provide an automated, flexible and scalable… ▽ More

    Submitted 6 March, 2020; originally announced March 2020.

  13. arXiv:1910.06529  [pdf, other

    eess.SP

    Grant-free Non-orthogonal Multiple Access for IoT: A Survey

    Authors: Muhammad Basit Shahab, Rana Abbas, Mahyar Shirvanimoghaddam, Sarah J. Johnson

    Abstract: Massive machine-type communications (mMTC) is one of the main three focus areas in the 5th generation (5G) of mobile standards to enable connectivity of a massive number of internet of things (IoT) devices with little or no human intervention. In conventional human-type communications (HTC), due to the limited number of available radio resources and orthogonal/non-overlap** nature of existing re… ▽ More

    Submitted 15 October, 2019; originally announced October 2019.

    Comments: Survey Paper

  14. arXiv:1907.07455  [pdf, other

    cs.CR

    An Overview of Attacks and Defences on Intelligent Connected Vehicles

    Authors: Mahdi Dibaei, Xi Zheng, Kun Jiang, Sasa Maric, Robert Abbas, Shigang Liu, Yuexin Zhang, Yao Deng, Sheng Wen, Jun Zhang, Yang Xiang, Shui Yu

    Abstract: Cyber security is one of the most significant challenges in connected vehicular systems and connected vehicles are prone to different cybersecurity attacks that endanger passengers' safety. Cyber security in intelligent connected vehicles is composed of in-vehicle security and security of inter-vehicle communications. Security of Electronic Control Units (ECUs) and the Control Area Network (CAN) b… ▽ More

    Submitted 17 July, 2019; originally announced July 2019.

  15. arXiv:1806.00161  [pdf, other

    eess.SP

    Fast Channel Estimation and Beam Tracking for Millimeter Wave Vehicular Communications

    Authors: Sina Shaham, Ming Ding, Matthew Kokshoorn, Zihuai Lin, Shu** Dang, Rana Abbas

    Abstract: Millimeter wave (mmWave) has been claimed to be the only viable solution for high-bandwidth vehicular communications. However, frequent channel estimation and beamforming required to provide a satisfactory quality of service limits mmWave for vehicular communications. In this paper, we propose a novel channel estimation and beam tracking framework for mmWave communications in a vehicular network s… ▽ More

    Submitted 25 September, 2019; v1 submitted 31 May, 2018; originally announced June 2018.

  16. arXiv:1802.09166  [pdf, ps, other

    cs.IT

    Short Block-length Codes for Ultra-Reliable Low-Latency Communications

    Authors: Mahyar Shirvanimoghaddam, Mohamad Sadegh Mohamadi, Rana Abbas, Aleksandar Minja, Chentao Yue, Balazs Matuz, Guojun Han, Zihuai Lin, Yonghui Li, Sarah Johnson, Branka Vucetic

    Abstract: This paper reviews the state of the art channel coding techniques for ultra-reliable low latency communication (URLLC). The stringent requirements of URLLC services, such as ultra-high reliability and low latency, have made it the most challenging feature of the fifth generation (5G) mobile systems. The problem is even more challenging for the services beyond the 5G promise, such as tele-surgery a… ▽ More

    Submitted 5 September, 2018; v1 submitted 26 February, 2018; originally announced February 2018.

    Comments: Accepted for publication in IEEE Communications Magazine

  17. arXiv:1709.00560  [pdf

    cs.IT

    Ultra-Reliable Low Latency Cellular Networks: Use Cases, Challenges and Approaches

    Authors: He Chen, Rana Abbas, Peng Cheng, Mahyar Shirvanimoghaddam, Wibowo Hardjawana, Wei Bao, Yonghui Li, Branka Vucetic

    Abstract: The fifth-generation cellular mobile networks are expected to support mission critical ultra-reliable low latency communication (URLLC) services in addition to the enhanced mobile broadband applications. This article first introduces three emerging mission critical applications of URLLC and identifies their requirements on end-to-end latency and reliability. We then investigate the various sources… ▽ More

    Submitted 7 August, 2018; v1 submitted 2 September, 2017; originally announced September 2017.

    Comments: Accepted to appear in IEEE Communications Magazine

  18. arXiv:1707.07401  [pdf, ps, other

    cs.IT

    Grant-Free Massive NOMA: Outage Probability and Throughput

    Authors: Rana Abbas, Mahyar Shirvanimoghaddam, Yonghui Li, Branka Vucetic

    Abstract: In this paper, we consider a massive uncoordinated non-orthogonal multiple access (NOMA) scheme where devices have strict latency requirements and no retransmission opportunities are available. Each device chooses a pilot sequence from a predetermined set as its signature and transmits its selected pilot and data simultaneously. A collision occurs when two or more devices choose the same pilot seq… ▽ More

    Submitted 24 July, 2017; originally announced July 2017.

  19. arXiv:1610.07250  [pdf, ps, other

    cs.IT

    Random Multiple Access for M2M Communications with QoS Guarantees

    Authors: Rana Abbas, Mahyar Shirvanimoghaddam, Yonghui Li, Branka Vucetic

    Abstract: We propose a novel random multiple access (RMA) scheme with quality of service (QoS) guarantees for machine-to-machine (M2M) communications. We consider a slotted uncoordinated data transmission period during which machine type communication (MTC) devices transmit over the same radio channel. Based on the latency requirements, MTC devices are divided into groups of different sizes, and the transmi… ▽ More

    Submitted 23 October, 2016; originally announced October 2016.

    Comments: 13 pages, 13 figures, 1 table