Skip to main content

Showing 1–18 of 18 results for author: Farooq, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.13282  [pdf, other

    cs.LG cs.AI

    RefreshNet: Learning Multiscale Dynamics through Hierarchical Refreshing

    Authors: Junaid Farooq, Danish Rafiq, Pantelis R. Vlachas, Mohammad Abid Bazaz

    Abstract: Forecasting complex system dynamics, particularly for long-term predictions, is persistently hindered by error accumulation and computational burdens. This study presents RefreshNet, a multiscale framework developed to overcome these challenges, delivering an unprecedented balance between computational efficiency and predictive accuracy. RefreshNet incorporates convolutional autoencoders to identi… ▽ More

    Submitted 24 January, 2024; originally announced January 2024.

  2. arXiv:2312.14247  [pdf, other

    cs.NI cs.LG eess.SY

    Deep Reinforcement Learning Based Placement for Integrated Access Backhauling in UAV-Assisted Wireless Networks

    Authors: Yuhui Wang, Junaid Farooq

    Abstract: The advent of fifth generation (5G) networks has opened new avenues for enhancing connectivity, particularly in challenging environments like remote areas or disaster-struck regions. Unmanned aerial vehicles (UAVs) have been identified as a versatile tool in this context, particularly for improving network performance through the Integrated access and backhaul (IAB) feature of 5G. However, existin… ▽ More

    Submitted 21 December, 2023; originally announced December 2023.

  3. arXiv:2309.13264  [pdf, other

    cs.CV

    Randomize to Generalize: Domain Randomization for Runway FOD Detection

    Authors: Javaria Farooq, Nayyer Aafaq, M Khizer Ali Khan, Ammar Saleem, M Ibraheem Siddiqui

    Abstract: Tiny Object Detection is challenging due to small size, low resolution, occlusion, background clutter, lighting conditions and small object-to-image ratio. Further, object detection methodologies often make underlying assumption that both training and testing data remain congruent. However, this presumption often leads to decline in performance when model is applied to out-of-domain(unseen) data.… ▽ More

    Submitted 23 September, 2023; originally announced September 2023.

    Comments: 29 pages, 9 figures

    ACM Class: I.4.9; I.5.4

  4. arXiv:2211.02833  [pdf, other

    cs.RO eess.SY

    Zero Touch Coordinated UAV Network Formation for 360° Views of a Moving Ground Target in Remote VR Applications

    Authors: Yuhui Wang, Junaid Farooq

    Abstract: Unmanned aerial vehicles (UAVs) with on-board cameras are widely used for remote surveillance and video capturing applications. In remote virtual reality (VR) applications, multiple UAVs can be used to capture different partially overlap** angles of the ground target, which can be stitched together to provide 360° views. This requires coordinated formation of UAVs that is adaptive to movements o… ▽ More

    Submitted 5 November, 2022; originally announced November 2022.

  5. arXiv:2209.04496  [pdf, other

    cs.NI eess.SY

    Proactive and Resilient UAV Orchestration for QoS Driven Connectivity and Coverage of Ground Users

    Authors: Yuhui Wang, Junaid Farooq

    Abstract: Unmanned aerial vehicles (UAVs) are being successfully used to deliver communication services in applications such as extending the coverage of 5G cellular networks in remote areas, emergency situations, and enhancing the service quality in regions of dense user populations. While optimized placement solutions have been proposed in literature for ensuring quality of service (QoS) of users, they ma… ▽ More

    Submitted 9 September, 2022; originally announced September 2022.

  6. arXiv:2006.16894  [pdf, other

    cs.NI eess.SY

    QoE Based Revenue Maximizing Dynamic Resource Allocation and Pricing for Fog-Enabled Mission-Critical IoT Applications

    Authors: Muhammad Junaid Farooq, Quanyan Zhu

    Abstract: Fog computing is becoming a vital component for Internet of things (IoT) applications, acting as its computational engine. Mission-critical IoT applications are highly sensitive to latency, which depends on the physical location of the cloud server. Fog nodes of varying response rates are available to the cloud service provider (CSP) and it is faced with a challenge of forwarding the sequentially… ▽ More

    Submitted 2 June, 2020; originally announced June 2020.

    Comments: IEEE Transactions on Mobile Computing 2020

  7. arXiv:2003.12363  [pdf, other

    cs.CR eess.SY

    Modeling and Assessment of IoT Supply Chain Security Risks: The Role of Structural and Parametric Uncertainties

    Authors: Timothy Kieras, Muhammad Junaid Farooq, Quanyan Zhu

    Abstract: Supply chain security threats pose new challenges to security risk modeling techniques for complex ICT systems such as the IoT. With established techniques drawn from attack trees and reliability analysis providing needed points of reference, graph-based analysis can provide a framework for considering the role of suppliers in such systems. We present such a framework here while highlighting the n… ▽ More

    Submitted 20 March, 2020; originally announced March 2020.

    Journal ref: IEEE Symposium on Security and Privacy 2020, Workshop on Cyber Resilient Supply Chain Technologies

  8. arXiv:2001.01561  [pdf, other

    eess.SP cs.NI

    PhD Forum: Enabling Autonomic IoT for Smart Urban Services

    Authors: Muhammad Junaid Farooq, Quanyan Zhu

    Abstract: The development of autonomous cyber-physical systems (CPS) and advances towards the fifth generation (5G) of wireless technology is promising to revolutionize many industry verticals such as Healthcare, Transportation, Energy, Retail Services, Building Automation, Education, etc., leading to the realization of the smart city paradigm. The Internet of Things (IoT), enables powerful and unprecedente… ▽ More

    Submitted 24 December, 2019; originally announced January 2020.

  9. arXiv:1911.12862  [pdf, other

    cs.CR

    RIoTS: Risk Analysis of IoT Supply Chain Threats

    Authors: Timothy Kieras, Muhammad Junaid Farooq, Quanyan Zhu

    Abstract: Securing the supply chain of information and communications technology (ICT) has recently emerged as a critical concern for national security and integrity. With the proliferation of Internet of Things (IoT) devices and their increasing role in controlling real world infrastructure, there is a need to analyze risks in networked systems beyond established security analyses. Existing methods in lite… ▽ More

    Submitted 28 November, 2019; originally announced November 2019.

  10. arXiv:1908.07828  [pdf, other

    cs.CR cs.NI

    IoT Supply Chain Security: Overview, Challenges, and the Road Ahead

    Authors: Muhammad Junaid Farooq, Quanyan Zhu

    Abstract: Supply chain is emerging as the next frontier of threats in the rapidly evolving IoT ecosystem. It is fundamentally more complex compared to traditional ICT systems. We analyze supply chain risks in IoT systems and their unique aspects, discuss research challenges in supply chain security, and identify future research directions.

    Submitted 21 July, 2019; originally announced August 2019.

  11. Optimal Dynamic Contract for Spectrum Reservation in Mission-Critical UNB-IoT Systems

    Authors: Muhammad Junaid Farooq, Quanyan Zhu

    Abstract: Spectrum reservation is emerging as one of the potential solutions to cater for the communication needs of massive number of wireless Internet of Things (IoT) devices with reliability constraints particularly in mission-critical scenarios. In most mission-critical systems, the true utility of a reservation may not be completely known ahead of time as the unforseen events might not be completely pr… ▽ More

    Submitted 21 March, 2018; originally announced March 2018.

    Journal ref: 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt 2018)

  12. Cognitive Connectivity Resilience in Multi-layer Remotely Deployed Mobile Internet of Things

    Authors: Muhammad Junaid Farooq, Quanyan Zhu

    Abstract: Enabling the Internet of things in remote areas without traditional communication infrastructure requires a multi-layer network architecture. The devices in the overlay network are required to provide coverage to the underlay devices as well as to remain connected to other overlay devices. The coordination, planning, and design of such two-layer heterogeneous networks is an important problem to ad… ▽ More

    Submitted 2 September, 2017; originally announced September 2017.

    Comments: To appear in IEEE Global Communications Conference (Globecom 2017)

    Journal ref: IEEE Global Communications Conference 2017

  13. Adaptive and Resilient Revenue Maximizing Dynamic Resource Allocation and Pricing for Cloud-Enabled IoT Systems

    Authors: Muhammad Junaid Farooq, Quanyan Zhu

    Abstract: Cloud computing is becoming an essential component of modern computer and communication systems. The available resources at the cloud such as computing nodes, storage, databases, etc. are often packaged in the form of virtual machines (VMs) to be used by remotely located client applications for computational tasks. However, the cloud has a limited number of VMs available, which have to be efficien… ▽ More

    Submitted 2 March, 2018; v1 submitted 26 July, 2017; originally announced July 2017.

    Comments: American Control Conference (ACC 2018)

    Journal ref: Annual American Control Conference (ACC 2018)

  14. Green Virtualization for Multiple Collaborative Cellular Operators

    Authors: Muhammad Junaid Farooq, Hakim Ghazzai, Elias Yaacoub, Abdullah Kadri, Mohamed-Slim Alouini

    Abstract: This paper proposes and investigates a green virtualization framework for infrastructure sharing among multiple cellular operators whose networks are powered by a combination of conventional and renewable sources of energy. Under the proposed framework, the virtual network formed by unifying radio access infrastructures of all operators is optimized for minimum energy consumption by deactivating b… ▽ More

    Submitted 31 May, 2017; originally announced June 2017.

    Comments: Accepted for publication in IEEE Transactions on Cognitive Communications and Networking

    Journal ref: IEEE Transactions on Cognitive Communications and Networking 2017

  15. Optimizing Mission Critical Data Dissemination in Massive IoT Networks

    Authors: Muhammad Junaid Farooq, Quanyan Zhu

    Abstract: Mission critical data dissemination in massive Internet of things (IoT) networks imposes constraints on the message transfer delay between devices. Due to low power and communication range of IoT devices, data is foreseen to be relayed over multiple device-to-device (D2D) links before reaching the destination. The coexistence of a massive number of IoT devices poses a challenge in maximizing the s… ▽ More

    Submitted 19 April, 2017; originally announced April 2017.

    Comments: Accepted in Workshop on Spatial Stochastic Models for Wireless Networks (SpaSWiN), Paris, France, May, 2017

    Journal ref: 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt 2017)

  16. Secure and Reconfigurable Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT)

    Authors: Muhammad Junaid Farooq, Quanyan Zhu

    Abstract: The Internet of things (IoT) is revolutionizing the management and control of automated systems leading to a paradigm shift in areas such as smart homes, smart cities, health care, transportation, etc. The IoT technology is also envisioned to play an important role in improving the effectiveness of military operations in battlefields. The interconnection of combat equipment and other battlefield r… ▽ More

    Submitted 1 March, 2017; originally announced March 2017.

    Comments: 8 pages, 9 figures

    Journal ref: 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt 2017)

  17. A Hybrid Energy Sharing Framework for Green Cellular Networks

    Authors: Muhammad Junaid Farooq, Hakim Ghazzai, Abdullah Kadri, Hesham ElSawy, Mohamed-Slim Alouini

    Abstract: Cellular operators are increasingly turning towards renewable energy (RE) as an alternative to using traditional electricity in order to reduce operational expenditure and carbon footprint. Due to the randomness in both RE generation and mobile traffic at each base station (BS), a surplus or shortfall of energy may occur at any given time. To increase energy self-reliance and minimize the network'… ▽ More

    Submitted 5 December, 2016; originally announced January 2017.

    Comments: 16 pages 8 figures in IEEE Transactions on Communications 2017

    Journal ref: IEEE Transactions on Communications 2017

  18. Green Networking in Cellular HetNets: A Unified Radio Resource Management Framework with Base Station ON/OFF Switching

    Authors: Hakim Ghazzai, Muhammad Junaid Farooq, Ahmad Alsharoa, Elias Yaacoub, Abdullah Kadri, Mohamed-Slim Alouini

    Abstract: In this paper, the problem of energy efficiency in cellular heterogeneous networks (HetNets) is investigated using radio resource and power management combined with the base station (BS) ON/OFF switching. The objective is to minimize the total power consumption of the network while satisfying the quality of service (QoS) requirements of each connected user. We consider the case of co-existing macr… ▽ More

    Submitted 5 December, 2016; originally announced December 2016.

    Comments: 15 pages, 9 Figures, IEEE Transactions on Vehicular Technology 2017

    Journal ref: IEEE Transactions on Vehicular Technology 2017