Skip to main content

Showing 1–4 of 4 results for author: Heidarpour, M R

.
  1. arXiv:2305.18778  [pdf, other

    cs.NI

    CN2F: A Cloud-Native Cellular Network Framework

    Authors: Sepehr Ganji, Shirin Behnaminia, Ali Ahangarpour, Erfan Mazaheri, Sara Baradaran, Zeinab Zali, Mohammad Reza Heidarpour, Ali Rakhshan, Mahsa Faraji Shoyari

    Abstract: Upcoming 5G and Beyond 5G (B5G) cellular networks aim to improve the efficiency and flexibility of mobile networks by incorporating various technologies, such as Software Defined Networking (SDN), Network Function Virtualization (NFV), and Network Slicing (NS). In this paper, we share our findings, accompanied by a comprehensive online codebase, about the best practice of using different open-sour… ▽ More

    Submitted 30 May, 2023; originally announced May 2023.

  2. arXiv:2204.12780  [pdf, ps, other

    cs.DS cs.NI math.OC

    A Branch-and-Price Approach to a Variant of the Cognitive Radio Resource Allocation Problem

    Authors: Hossein Falsafain, Mohammad Reza Heidarpour, Soroush Vahidi

    Abstract: Radio-frequency portion of the electromagnetic spectrum is a scarce resource. Cognitive radio technology has emerged as a promising solution to overcome the spectrum scarcity bottleneck. Through this technology, secondary users (SUs) sense the spectrum opportunities free from primary users (PUs), and opportunistically take advantage of these (temporarily) idle portions, known as spectrum holes. In… ▽ More

    Submitted 27 April, 2022; originally announced April 2022.

    Comments: Accepted Manuscript - Ad Hoc Networks - https://doi.org/10.1016/j.adhoc.2022.102871

  3. arXiv:2111.10261  [pdf, other

    cs.GT cs.NI

    Optimal Association Strategy of Multi-gateway Wireless Sensor Networks Against Smart Jammers

    Authors: Mohammad Reza Heidarpour, Mohammad Hossein Manshaei

    Abstract: Engineers have numerous low-power wireless sensor devices in the current network setup for the Internet of Things, such as ZigBee, LoRaWAN, ANT, or Bluetooth. These low-power wireless sensors are the best candidates to transfer and collect data. But they are all vulnerable to the physical jamming attack since it is not costly for the attackers to run low power jammer sources in these networks. Hav… ▽ More

    Submitted 18 November, 2021; originally announced November 2021.

  4. arXiv:2004.14826  [pdf, other

    cs.CR cs.CY cs.LG stat.ML

    Wide-AdGraph: Detecting Ad Trackers with a Wide Dependency Chain Graph

    Authors: Amir Hossein Kargaran, Mohammad Sadegh Akhondzadeh, Mohammad Reza Heidarpour, Mohammad Hossein Manshaei, Kave Salamatian, Masoud Nejad Sattary

    Abstract: Websites use third-party ads and tracking services to deliver targeted ads and collect information about users that visit them. These services put users' privacy at risk, and that is why users' demand for blocking these services is growing. Most of the blocking solutions rely on crowd-sourced filter lists manually maintained by a large community of users. In this work, we seek to simplify the upda… ▽ More

    Submitted 10 May, 2021; v1 submitted 29 April, 2020; originally announced April 2020.

    Comments: 9 pages, 7 figures, To appear in the 13th ACM Web Science Conference 2021 (WebSci '21), June 2021