-
AI-Assisted Dynamic Port and Waveform Switching for Enhancing UL Coverage in 5G NR
Authors:
Alejandro Villena-Rodríguez,
Gerardo Gómez,
Mari Carmen Aguayo-Torres,
Francisco J. Martín-Vega,
José Outes-Carnero,
F. Yak Ng-Molina,
Juan Ramiro-Moreno
Abstract:
The uplink of 5G networks allows selecting the transmit waveform between cyclic prefix orthogonal frequency division multiplexing (CP-OFDM) and discrete Fourier transform spread OFDM (DFT-S-OFDM), which is appealing for cell-edge users using high-frequency bands, since it shows a smaller peak-to-average power ratio, and allows a higher transmit power. Nevertheless, DFT-S-OFDM exhibits a higher blo…
▽ More
The uplink of 5G networks allows selecting the transmit waveform between cyclic prefix orthogonal frequency division multiplexing (CP-OFDM) and discrete Fourier transform spread OFDM (DFT-S-OFDM), which is appealing for cell-edge users using high-frequency bands, since it shows a smaller peak-to-average power ratio, and allows a higher transmit power. Nevertheless, DFT-S-OFDM exhibits a higher block error rate (BLER) which complicates an optimal waveform selection. In this paper, we propose an intelligent waveform-switching mechanism based on deep reinforcement learning (DRL). In this proposal, a learning agent aims at maximizing a function built using available throughput percentiles in real networks. Said percentiles are weighted so as to improve the cell-edge users' service without dramatically reducing the cell average. Aggregated measurements of signal-to-noise ratio (SNR) and timing advance (TA), available in real networks, are used in the procedure. Results show that our proposed scheme greatly outperforms both metrics compared to classical approaches.
△ Less
Submitted 19 June, 2024;
originally announced June 2024.
-
Cybercrime Bitcoin Revenue Estimations: Quantifying the Impact of Methodology and Coverage
Authors:
Gibran Gomez,
Kevin van Liebergen,
Juan Caballero
Abstract:
Multiple works have leveraged the public Bitcoin ledger to estimate the revenue cybercriminals obtain from their victims. Estimations focusing on the same target often do not agree, due to the use of different methodologies, seed addresses, and time periods. These factors make it challenging to understand the impact of their methodological differences. Furthermore, they underestimate the revenue d…
▽ More
Multiple works have leveraged the public Bitcoin ledger to estimate the revenue cybercriminals obtain from their victims. Estimations focusing on the same target often do not agree, due to the use of different methodologies, seed addresses, and time periods. These factors make it challenging to understand the impact of their methodological differences. Furthermore, they underestimate the revenue due to the (lack of) coverage on the target's payment addresses, but how large this impact remains unknown.
In this work, we perform the first systematic analysis on the estimation of cybercrime bitcoin revenue. We implement a tool that can replicate the different estimation methodologies. Using our tool we can quantify, in a controlled setting, the impact of the different methodology steps. In contrast to what is widely believed, we show that the revenue is not always underestimated. There exist methodologies that can introduce huge overestimation. We collect 30,424 payment addresses and use them to compare the financial impact of 6 cybercrimes (ransomware, clippers, sextortion, Ponzi schemes, giveaway scams, exchange scams) and of 141 cybercriminal groups. We observe that the popular multi-input clustering fails to discover addresses for 40% of groups. We quantify, for the first time, the impact of the (lack of) coverage on the estimation. For this, we propose two techniques to achieve high coverage, possibly nearly complete, on the DeadBolt server ransomware. Our expanded coverage enables estimating DeadBolt's revenue at $2.47M, 39 times higher than the estimation using two popular Internet scan engines.
△ Less
Submitted 27 November, 2023; v1 submitted 7 September, 2023;
originally announced September 2023.
-
The Rise of GoodFATR: A Novel Accuracy Comparison Methodology for Indicator Extraction Tools
Authors:
Juan Caballero,
Gibran Gomez,
Srdjan Matic,
Gustavo Sánchez,
Silvia Sebastián,
Arturo Villacañas
Abstract:
To adapt to a constantly evolving landscape of cyber threats, organizations actively need to collect Indicators of Compromise (IOCs), i.e., forensic artifacts that signal that a host or network might have been compromised. IOCs can be collected through open-source and commercial structured IOC feeds. But, they can also be extracted from a myriad of unstructured threat reports written in natural la…
▽ More
To adapt to a constantly evolving landscape of cyber threats, organizations actively need to collect Indicators of Compromise (IOCs), i.e., forensic artifacts that signal that a host or network might have been compromised. IOCs can be collected through open-source and commercial structured IOC feeds. But, they can also be extracted from a myriad of unstructured threat reports written in natural language and distributed using a wide array of sources such as blogs and social media. There exist multiple indicator extraction tools that can identify IOCs in natural language reports. But, it is hard to compare their accuracy due to the difficulty of building large ground truth datasets. This work presents a novel majority vote methodology for comparing the accuracy of indicator extraction tools, which does not require a manually-built ground truth. We implement our methodology into GoodFATR, an automated platform for collecting threat reports from a wealth of sources, extracting IOCs from the collected reports using multiple tools, and comparing their accuracy.
GoodFATR supports 6 threat report sources: RSS, Twitter, Telegram, Malpedia, APTnotes, and ChainSmith. GoodFATR continuously monitors the sources, downloads new threat reports, extracts 41 indicator types from the collected reports, and filters non-malicious indicators to output the IOCs. We run GoodFATR over 15 months to collect 472,891 reports from the 6 sources; extract 978,151 indicators from the reports; and identify 618,217 IOCs. We analyze the collected data to identify the top IOC contributors and the IOC class distribution. We apply GoodFATR to compare the IOC extraction accuracy of 7 popular open-source tools with GoodFATR's own indicator extraction module.
△ Less
Submitted 8 March, 2023; v1 submitted 29 July, 2022;
originally announced August 2022.
-
Generating and Detecting True Ambiguity: A Forgotten Danger in DNN Supervision Testing
Authors:
Michael Weiss,
André García Gómez,
Paolo Tonella
Abstract:
Deep Neural Networks (DNNs) are becoming a crucial component of modern software systems, but they are prone to fail under conditions that are different from the ones observed during training (out-of-distribution inputs) or on inputs that are truly ambiguous, i.e., inputs that admit multiple classes with nonzero probability in their labels. Recent work proposed DNN supervisors to detect high-uncert…
▽ More
Deep Neural Networks (DNNs) are becoming a crucial component of modern software systems, but they are prone to fail under conditions that are different from the ones observed during training (out-of-distribution inputs) or on inputs that are truly ambiguous, i.e., inputs that admit multiple classes with nonzero probability in their labels. Recent work proposed DNN supervisors to detect high-uncertainty inputs before their possible misclassification leads to any harm. To test and compare the capabilities of DNN supervisors, researchers proposed test generation techniques, to focus the testing effort on high-uncertainty inputs that should be recognized as anomalous by supervisors. However, existing test generators aim to produce out-of-distribution inputs. No existing model- and supervisor independent technique targets the generation of truly ambiguous test inputs, i.e., inputs that admit multiple classes according to expert human judgment.
In this paper, we propose a novel way to generate ambiguous inputs to test DNN supervisors and used it to empirically compare several existing supervisor techniques. In particular, we propose AmbiGuess to generate ambiguous samples for image classification problems. AmbiGuess is based on gradient-guided sampling in the latent space of a regularized adversarial autoencoder. Moreover, we conducted what is -- to the best of our knowledge -- the most extensive comparative study of DNN supervisors, considering their capabilities to detect 4 distinct types of high-uncertainty inputs, including truly ambiguous ones. We find that the tested supervisors' capabilities are complementary: Those best suited to detect true ambiguity perform worse on invalid, out-of-distribution and adversarial inputs and vice-versa.
△ Less
Submitted 8 September, 2023; v1 submitted 21 July, 2022;
originally announced July 2022.
-
Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration
Authors:
Gibran Gomez,
Pedro Moreno-Sanchez,
Juan Caballero
Abstract:
Cybercriminals often leverage Bitcoin for their illicit activities. In this work, we propose back-and-forth exploration, a novel automated Bitcoin transaction tracing technique to identify cybercrime financial relationships. Given seed addresses belonging to a cybercrime campaign, it outputs a transaction graph, and identifies paths corresponding to relationships between the campaign under study a…
▽ More
Cybercriminals often leverage Bitcoin for their illicit activities. In this work, we propose back-and-forth exploration, a novel automated Bitcoin transaction tracing technique to identify cybercrime financial relationships. Given seed addresses belonging to a cybercrime campaign, it outputs a transaction graph, and identifies paths corresponding to relationships between the campaign under study and external services and other cybercrime campaigns. Back-and-forth exploration provides two key contributions. First, it explores both forward and backwards, instead of only forward as done by prior work, enabling the discovery of relationships that cannot be found by only exploring forward (e.g., deposits from clients of a mixer). Second, it prevents graph explosion by combining a tagging database with a machine learning classifier for identifying addresses belonging to exchanges. We evaluate back-and-forth exploration on 30 malware families. We build oracles for 4 families using Bitcoin for C&C and use them to demonstrate that back-and-forth exploration identifies 13 C&C signaling addresses missed by prior work, 8 of which are fundamentally missed by forward-only explorations. Our approach uncovers a wealth of services used by the malware including 44 exchanges, 11 gambling sites, 5 payment service providers, 4 underground markets, 4 mining pools, and 2 mixers. In 4 families, the relations include new attribution points missed by forward-only explorations. It also identifies relationships between the malware families and other cybercrime campaigns, highlighting how some malware operators participate in a variety of cybercriminal activities.
△ Less
Submitted 18 October, 2022; v1 submitted 1 June, 2022;
originally announced June 2022.
-
Joint Distribution of Distance and Angles in Finite Wireless Networks
Authors:
Francisco J. Martín-Vega,
Gerardo Gómez,
David Morales-Jiménez,
F. Javier López-Martínez,
Mari Carmen Aguayo-Torres
Abstract:
Directional beamforming will play a paramount role in 5G and beyond networks in order to combat the higher path losses incurred at millimeter wave bands. Appropriate modeling and analysis of the angles and distances between transmitters and receivers in these networks are thus essential to understand performance and limiting factors. Most existing literature considers either infinite and uniform n…
▽ More
Directional beamforming will play a paramount role in 5G and beyond networks in order to combat the higher path losses incurred at millimeter wave bands. Appropriate modeling and analysis of the angles and distances between transmitters and receivers in these networks are thus essential to understand performance and limiting factors. Most existing literature considers either infinite and uniform networks, where nodes are drawn according to a Poisson point process, or finite networks with the reference receiver placed at the origin of a disk. Under either of these assumptions, the distance and azimuth angle between transmitter and receiver are independent, and the angle follows a uniform distribution between $0$ and $2π$. Here, we consider a more realistic case of finite networks where the reference node is placed at any arbitrary location. We obtain the joint distribution between the distance and azimuth angle and demonstrate that these random variables do exhibit certain correlation, which depends on the shape of the region and the location of the reference node. To conduct the analysis, we present a general mathematical framework which is specialized to exemplify the case of a rectangular region. We then also derive the statistics for the 3D case where, considering antenna heights, the joint distribution of distance, azimuth and zenith angles is obtained. Finally, we describe some immediate applications of the present work, including the analysis of directional beamforming, the design of analog codebooks and wireless routing algorithms.
△ Less
Submitted 18 May, 2023; v1 submitted 25 March, 2022;
originally announced March 2022.
-
Latency Fairness Optimization on Wireless Networks through Deep Reinforcement Learning
Authors:
M. López-Sánchez,
A. Villena-Rodríguez,
G. Gómez,
F. J. Martín-Vega,
M. C. Aguayo-Torres
Abstract:
In this paper, we propose a novel deep reinforcement learning framework to maximize user fairness in terms of delay. To this end, we devise a new version of the modified largest weighted delay first (M-LWDF) algorithm, which is called $β$-M-LWDF, aiming to fulfill an appropriate balance between user fairness and average delay. This balance is defined as a feasible region on the cumulative distribu…
▽ More
In this paper, we propose a novel deep reinforcement learning framework to maximize user fairness in terms of delay. To this end, we devise a new version of the modified largest weighted delay first (M-LWDF) algorithm, which is called $β$-M-LWDF, aiming to fulfill an appropriate balance between user fairness and average delay. This balance is defined as a feasible region on the cumulative distribution function (CDF) of the user delay that allows identifying unfair states, feasible-fair states, and over-fair states. Simulation results reveal that our proposed framework outperforms traditional resource allocation techniques in terms of latency fairness and average delay
△ Less
Submitted 25 January, 2022;
originally announced January 2022.
-
Unsupervised Detection and Clustering of Malicious TLS Flows
Authors:
Gibran Gomez,
Platon Kotzias,
Matteo Dell'Amico,
Leyla Bilge,
Juan Caballero
Abstract:
Malware abuses TLS to encrypt its malicious traffic, preventing examination by content signatures and deep packet inspection. Network detection of malicious TLS flows is an important, but challenging, problem. Prior works have proposed supervised machine learning detectors using TLS features. However, by trying to represent all malicious traffic, supervised binary detectors produce models that are…
▽ More
Malware abuses TLS to encrypt its malicious traffic, preventing examination by content signatures and deep packet inspection. Network detection of malicious TLS flows is an important, but challenging, problem. Prior works have proposed supervised machine learning detectors using TLS features. However, by trying to represent all malicious traffic, supervised binary detectors produce models that are too loose, thus introducing errors. Furthermore, they do not distinguish flows generated by different malware. On the other hand, supervised multi-class detectors produce tighter models and can classify flows by malware family, but require family labels, which are not available for many samples.
To address these limitations, this work proposes a novel unsupervised approach to detect and cluster malicious TLS flows. Our approach takes as input network traces from sandboxes. It clusters similar TLS flows using 90 features that capture properties of the TLS client, TLS server, certificate, and encrypted payload; and uses the clusters to build an unsupervised detector that can assign a malicious flow to the cluster it belongs to, or determine it is benign. We evaluate our approach using 972K traces from a commercial sandbox and 35M TLS flows from a research network. Our clustering shows very high precision and recall with an F1 score of 0.993. We compare our unsupervised detector with two state-of-the-art approaches, showing that it outperforms both. The false detection rate of our detector is 0.032% measured over four months of traffic.
△ Less
Submitted 23 December, 2022; v1 submitted 8 September, 2021;
originally announced September 2021.
-
Sketches image analysis: Web image search engine usingLSH index and DNN InceptionV3
Authors:
Alessio Schiavo,
Filippo Minutella,
Mattia Daole,
Marsha Gomez Gomez
Abstract:
The adoption of an appropriate approximate similarity search method is an essential prereq-uisite for develo** a fast and efficient CBIR system, especially when dealing with large amount ofdata. In this study we implement a web image search engine on top of a Locality Sensitive Hashing(LSH) Index to allow fast similarity search on deep features. Specifically, we exploit transfer learningfor deep…
▽ More
The adoption of an appropriate approximate similarity search method is an essential prereq-uisite for develo** a fast and efficient CBIR system, especially when dealing with large amount ofdata. In this study we implement a web image search engine on top of a Locality Sensitive Hashing(LSH) Index to allow fast similarity search on deep features. Specifically, we exploit transfer learningfor deep features extraction from images. Firstly, we adopt InceptionV3 pretrained on ImageNet asfeatures extractor, secondly, we try out several CNNs built on top of InceptionV3 as convolutionalbase fine-tuned on our dataset. In both of the previous cases we index the features extracted within ourLSH index implementation so as to compare the retrieval performances with and without fine-tuning.In our approach we try out two different LSH implementations: the first one working with real numberfeature vectors and the second one with the binary transposed version of those vectors. Interestingly,we obtain the best performances when using the binary LSH, reaching almost the same result, in termsof mean average precision, obtained by performing sequential scan of the features, thus avoiding thebias introduced by the LSH index. Lastly, we carry out a performance analysis class by class in terms ofrecall againstmAPhighlighting, as expected, a strong positive correlation between the two.
△ Less
Submitted 3 May, 2021;
originally announced May 2021.
-
On the Vapnik-Chervonenkis dimension of products of intervals in $\mathbb{R}^d$
Authors:
Alirio Gómez Gómez,
Pedro L. Kaufmann
Abstract:
We study combinatorial complexity of certain classes of products of intervals in $\mathbb{R}^d$, from the point of view of Vapnik-Chervonenkis geometry. As a consequence of the obtained results, we conclude that the Vapnik-Chervonenkis dimension of the set of balls in $\ell_\infty^d$ -- which denotes $\R^d$ equipped with the sup norm -- equals $\lfloor (3d+1)/2\rfloor$.
We study combinatorial complexity of certain classes of products of intervals in $\mathbb{R}^d$, from the point of view of Vapnik-Chervonenkis geometry. As a consequence of the obtained results, we conclude that the Vapnik-Chervonenkis dimension of the set of balls in $\ell_\infty^d$ -- which denotes $\R^d$ equipped with the sup norm -- equals $\lfloor (3d+1)/2\rfloor$.
△ Less
Submitted 14 April, 2021;
originally announced April 2021.
-
On the Usage of Generative Models for Network Anomaly Detection in Multivariate Time-Series
Authors:
Gastón García González,
Pedro Casas,
Alicia Fernández,
Gabriel Gómez
Abstract:
Despite the many attempts and approaches for anomaly detection explored over the years, the automatic detection of rare events in data communication networks remains a complex problem. In this paper we introduce Net-GAN, a novel approach to network anomaly detection in time-series, using recurrent neural networks (RNNs) and generative adversarial networks (GAN). Different from the state of the art…
▽ More
Despite the many attempts and approaches for anomaly detection explored over the years, the automatic detection of rare events in data communication networks remains a complex problem. In this paper we introduce Net-GAN, a novel approach to network anomaly detection in time-series, using recurrent neural networks (RNNs) and generative adversarial networks (GAN). Different from the state of the art, which traditionally focuses on univariate measurements, Net-GAN detects anomalies in multivariate time-series, exploiting temporal dependencies through RNNs. Net-GAN discovers the underlying distribution of the baseline, multivariate data, without making any assumptions on its nature, offering a powerful approach to detect anomalies in complex, difficult to model network monitoring data. We further exploit the concepts behind generative models to conceive Net-VAE, a complementary approach to Net-GAN for network anomaly detection, based on variational auto-encoders (VAE). We evaluate Net-GAN and Net-VAE in different monitoring scenarios, including anomaly detection in IoT sensor data, and intrusion detection in network measurements. Generative models represent a promising approach for network anomaly detection, especially when considering the complexity and ever-growing number of time-series to monitor in operational networks.
△ Less
Submitted 16 October, 2020;
originally announced October 2020.
-
A Product Channel Attack to Wireless Physical Layer Security
Authors:
Gonzalo J. Anaya-Lopez,
Gerardo Gomez,
F. Javier Lopez-Martinez
Abstract:
We propose a novel attack that compromises the physical layer security of downlink (DL) communications in wireless systems. This technique is based on the transmission of a slowly-varying random symbol by the eavesdropper during its uplink transmission, so that the equivalent fading channel observed at the base station (BS) has a larger variance. Then, the BS designs the secure DL transmission und…
▽ More
We propose a novel attack that compromises the physical layer security of downlink (DL) communications in wireless systems. This technique is based on the transmission of a slowly-varying random symbol by the eavesdropper during its uplink transmission, so that the equivalent fading channel observed at the base station (BS) has a larger variance. Then, the BS designs the secure DL transmission under the assumption that the eavesdropper's channel experiences a larger fading severity than in reality. We show that this approach can lead the BS to transmit to Bob at a rate larger than the secrecy capacity, thus compromising the system secure operation. Our analytical results, corroborated by simulations, show that the use of multiple antennas at the BS may partially alleviate but not immunize against these type of attacks.
△ Less
Submitted 16 July, 2020;
originally announced July 2020.
-
Wiener Filter for Short-Reach Fiber-Optic Links
Authors:
Daniel Plabst,
Francisco Javier García Gómez,
Thomas Wiegart,
Norbert Hanik
Abstract:
Analytic expressions are derived for the Wiener filter (WF), also known as the linear minimum mean square error (LMMSE) estimator, for an intensity-modulation/direct-detection (IM/DD) short-haul fiber-optic communication system. The link is purely dispersive and the nonlinear square-law detector (SLD) operates at the thermal noise limit. The achievable rates of geometrically shaped PAM constellati…
▽ More
Analytic expressions are derived for the Wiener filter (WF), also known as the linear minimum mean square error (LMMSE) estimator, for an intensity-modulation/direct-detection (IM/DD) short-haul fiber-optic communication system. The link is purely dispersive and the nonlinear square-law detector (SLD) operates at the thermal noise limit. The achievable rates of geometrically shaped PAM constellations are substantially increased by taking the SLD into account as compared to a WF that ignores the SLD.
△ Less
Submitted 5 August, 2020; v1 submitted 25 April, 2020;
originally announced April 2020.
-
Learning CHARME models with neural networks
Authors:
José G. Gómez García,
Jalal Fadili,
Christophe Chesneau
Abstract:
In this paper, we consider a model called CHARME (Conditional Heteroscedastic Autoregressive Mixture of Experts), a class of generalized mixture of nonlinear nonparametric AR-ARCH time series. Under certain Lipschitz-type conditions on the autoregressive and volatility functions, we prove that this model is stationary, ergodic and $τ$-weakly dependent. These conditions are much weaker than those p…
▽ More
In this paper, we consider a model called CHARME (Conditional Heteroscedastic Autoregressive Mixture of Experts), a class of generalized mixture of nonlinear nonparametric AR-ARCH time series. Under certain Lipschitz-type conditions on the autoregressive and volatility functions, we prove that this model is stationary, ergodic and $τ$-weakly dependent. These conditions are much weaker than those presented in the literature that treats this model. Moreover, this result forms the theoretical basis for deriving an asymptotic theory of the underlying (non)parametric estimation, which we present for this model. As an application, from the universal approximation property of neural networks (NN), we develop a learning theory for the NN-based autoregressive functions of the model, where the strong consistency and asymptotic normality of the considered estimator of the NN weights and biases are guaranteed under weak conditions.
△ Less
Submitted 17 November, 2020; v1 submitted 8 February, 2020;
originally announced February 2020.
-
Software System Design based on Patterns for Newton-Type Methods
Authors:
Ricardo Serrato Barrera,
Gustavo Rodríguez Gómez,
Julio César Pérez Sansalvador,
Saul E. Pomares Hernández,
Leticia Flores Pulido,
Antonio Muñoz
Abstract:
A wide range of engineering applications uses optimisation techniques as part of their solution process. The researcher uses specialized software that implements well-known optimisation techniques to solve his problem. However, when it comes to develop original optimisation techniques that fit a particular problem the researcher has no option but to implement his own new method from scratch. This…
▽ More
A wide range of engineering applications uses optimisation techniques as part of their solution process. The researcher uses specialized software that implements well-known optimisation techniques to solve his problem. However, when it comes to develop original optimisation techniques that fit a particular problem the researcher has no option but to implement his own new method from scratch. This leads to large development times and error prone code that, in general, will not be reused for any other application. In this work, we present a novel methodology that simplifies, fasten and improves the development process of scientific software. This methodology guide us on the identification of design patterns. The application of this methodology generates reusable, flexible and high quality scientific software. Furthermore, the produced software becomes a documented tool to transfer the knowledge on the development process of scientific software. We apply this methodology for the design of an optimisation framework implementing Newton's type methods which can be used as a fast prototy** tool of new optimisation techniques based on Newton's type methods. The abstraction, reusability and flexibility of the developed framework is measured by means of Martin's metric. The results indicate that the developed software is highly reusable.
△ Less
Submitted 12 May, 2019;
originally announced May 2019.
-
Multi-hop assortativities for networks classification
Authors:
Leonardo Gutierrez Gomez,
Jean-Charles Delvenne
Abstract:
Several social, medical, engineering and biological challenges rely on discovering the functionality of networks from their structure and node metadata, when it is available. For example, in chemoinformatics one might want to detect whether a molecule is toxic based on structure and atomic types, or discover the research field of a scientific collaboration network. Existing techniques rely on coun…
▽ More
Several social, medical, engineering and biological challenges rely on discovering the functionality of networks from their structure and node metadata, when it is available. For example, in chemoinformatics one might want to detect whether a molecule is toxic based on structure and atomic types, or discover the research field of a scientific collaboration network. Existing techniques rely on counting or measuring structural patterns that are known to show large variations from network to network, such as the number of triangles, or the assortativity of node metadata. We introduce the concept of multi-hop assortativity, that captures the similarity of the nodes situated at the extremities of a randomly selected path of a given length. We show that multi-hop assortativity unifies various existing concepts and offers a versatile family of 'fingerprints' to characterize networks. These fingerprints allow in turn to recover the functionalities of a network, with the help of the machine learning toolbox. Our method is evaluated empirically on established social and chemoinformatic network benchmarks. Results reveal that our assortativity based features are competitive providing highly accurate results often outperforming state of the art methods for the network classification task.
△ Less
Submitted 16 November, 2018; v1 submitted 14 September, 2018;
originally announced September 2018.
-
Physical Layer Security in Uplink NOMA Multi-Antenna Systems with Randomly Distributed Eavesdroppers
Authors:
Gerardo Gomez,
Francisco J. Martin-Vega,
F. Javier Lopez-Martinez,
Yuanwei Liu,
Maged Elkashlan
Abstract:
The physical layer security of uplink non-orthogonal multiple access (NOMA) is analyzed. A stochastic geometry approach is applied to analyze the coverage probability and the effective secrecy throughput (EST) of the kth NOMA user, where a fixed or an adaptive transmission rate can be used. A protected zone around the legitimate terminals to establish an eavesdropper-exclusion area. We assume that…
▽ More
The physical layer security of uplink non-orthogonal multiple access (NOMA) is analyzed. A stochastic geometry approach is applied to analyze the coverage probability and the effective secrecy throughput (EST) of the kth NOMA user, where a fixed or an adaptive transmission rate can be used. A protected zone around the legitimate terminals to establish an eavesdropper-exclusion area. We assume that the channel state information associated with eavesdroppers is not available at the base station. We consider that the base station is equipped with multiple antennas. The impact of imperfect successive interference cancellation is also taken into account in this work. Our analysis allows an easy selection of the wiretap code rates that maximizes the EST. Additionally, our framework also allows an optimum selection of other system parameters like the transmit power or the eavesdropper-exclusion radius.
△ Less
Submitted 13 September, 2018; v1 submitted 14 September, 2017;
originally announced September 2017.
-
On Muting Mobile Terminals for Uplink Interference Mitigation in HetNets -- System-Level Analysis via Stochastic Geometry
Authors:
F. J. Martin-Vega,
M. C. Aguayo-Torres,
G. Gomez,
M. Di Renzo
Abstract:
We investigate the performance of a scheduling algorithm where the Mobile Terminals (MTs) may be turned off if they cause a level of interference greater than a given threshold. This approach, which is referred to as Interference Aware Muting (IAM), may be regarded as an interference-aware scheme that is aimed to reduce the level of interference. We analyze its performance with the aid of stochast…
▽ More
We investigate the performance of a scheduling algorithm where the Mobile Terminals (MTs) may be turned off if they cause a level of interference greater than a given threshold. This approach, which is referred to as Interference Aware Muting (IAM), may be regarded as an interference-aware scheme that is aimed to reduce the level of interference. We analyze its performance with the aid of stochastic geometry and compare it against other interference-unaware and interference-aware schemes, where the level of interference is kept under control in the power control scheme itself rather than in the scheduling process. IAM is studied in terms of average transmit power, mean and variance of the interference, coverage probability, Spectral Efficiency (SE), and Binary Rate (BR), which accounts for the amount of resources allocated to the typical MT. Simplified expressions of SE and BR for adaptive modulation and coding schemes are proposed, which better characterize practical communication systems. Our system-level analysis unveils that IAM increases the BR and reduces the mean and variance of the interference. It is proved that an operating regime exists, where the performance of IAM is independent of the cell association criterion, which simplifies the joint design of uplink and downlink transmissions.
△ Less
Submitted 13 February, 2017;
originally announced February 2017.
-
Geo-Location Based Access for Vehicular Communications: Analysis and Optimization via Stochastic Geometry
Authors:
Francisco J. Martin-Vega,
Beatriz Soret,
Mari Carmen Aguayo-Torres,
Istvan Z. Kovacs,
Gerardo Gomez
Abstract:
Delivery of broadcast messages among vehicles for safety purposes, which is known as one of the key ingredients of Intelligent Transportation Systems (ITS), requires an efficient Medium Access Control (MAC) that provides low average delay and high reliability. To this end, a Geo-Location Based Access (GLOC) for vehicles has been proposed for Vehicle-to-Vehicle (V2V) communications, aiming at maxim…
▽ More
Delivery of broadcast messages among vehicles for safety purposes, which is known as one of the key ingredients of Intelligent Transportation Systems (ITS), requires an efficient Medium Access Control (MAC) that provides low average delay and high reliability. To this end, a Geo-Location Based Access (GLOC) for vehicles has been proposed for Vehicle-to-Vehicle (V2V) communications, aiming at maximizing the distance of co-channel transmitters while preserving a low latency when accessing the resources. In this paper we analyze, with the aid of stochastic geometry, the delivery of periodic and non-periodic broadcast messages with GLOC, taking into account path loss and fading as well as the random locations of transmitting vehicles. Analytical results include the average interference, average Binary Rate (BR), capture probability, i.e., the probability of successful message transmission, and Energy Efficiency (EE). Mathematical analysis reveals interesting insights about the system performance, which are validated thought extensive Monte Carlo simulations. In particular, it is shown that the capture probability is an increasing function with exponential dependence with respect to the transmit power and it is demonstrated that an arbitrary high capture probability can be achieved, as long as the number of access resources is high enough. Finally, to facilitate the system-level design of GLOC, the optimum transmit power is derived, which leads to a maximal EE subject to a given constraint in the capture probability.
△ Less
Submitted 23 December, 2016;
originally announced December 2016.
-
Analytical Modeling of Interference Aware Power Control for the Uplink of Heterogeneous Cellular Networks
Authors:
Francisco J. Martin-Vega,
Gerardo Gomez,
Mari Carmen Aguayo-Torres,
Marco Di Renzo
Abstract:
Inter-cell interference is one of the main limiting factors in current Heterogeneous Cellular Networks (HCNs). Uplink Fractional Power Control (FPC) is a well known method that aims to cope with such limiting factor as well as to save battery live. In order to do that, the path losses associated with Mobile Terminal (MT) transmissions are partially compensated so that a lower interference is leake…
▽ More
Inter-cell interference is one of the main limiting factors in current Heterogeneous Cellular Networks (HCNs). Uplink Fractional Power Control (FPC) is a well known method that aims to cope with such limiting factor as well as to save battery live. In order to do that, the path losses associated with Mobile Terminal (MT) transmissions are partially compensated so that a lower interference is leaked towards neighboring cells. Classical FPC techniques only consider a set of parameters that depends on the own MT transmission, like desired received power at the Base Station (BS) or the path loss between the MT and its serving BS, among others. Contrary to classical FPC, in this paper we use stochastic geometry to analyze a power control mechanism that keeps the interference generated by each MT under a given threshold. We also consider a maximum transmitted power and a partial compensation of the path loss. Interestingly, our analysis reveals that such Interference Aware (IA) method can reduce the average power consumption and increase the average spectral efficiency. Additionally, the variance of the interference is reduced, thus improving the performance of Adaptive Modulation and Coding (AMC) since the interference can be better estimated at the MT.
△ Less
Submitted 13 January, 2016;
originally announced January 2016.
-
On the Equivalence between Interference and Eavesdrop** in Wireless Communications
Authors:
Gerardo Gomez,
F. Javier Lopez-Martinez,
David Morales-Jimenez,
Matthew R. McKay
Abstract:
We show that the problem of analyzing the outage probability in cellular systems affected by co-channel interference and background noise is mathematically equivalent to the problem of analyzing the wireless information-theoretic security in terms of the maximum secrecy rate in fading channels. Hence, these both apparently unrelated problems can be addressed by using a common approach. We illustra…
▽ More
We show that the problem of analyzing the outage probability in cellular systems affected by co-channel interference and background noise is mathematically equivalent to the problem of analyzing the wireless information-theoretic security in terms of the maximum secrecy rate in fading channels. Hence, these both apparently unrelated problems can be addressed by using a common approach. We illustrate the applicability of the connection unveiled herein to provide new results for the secrecy outage probability in different scenarios.
△ Less
Submitted 25 February, 2015; v1 submitted 31 July, 2014;
originally announced July 2014.
-
YouTube QoE Evaluation Tool for Android Wireless Terminals
Authors:
Gerardo Gomez,
Lorenzo Hortiguela,
Quiliano Perez,
Javier Lorca,
Raquel Garcia,
Mari Carmen Aguayo-Torres
Abstract:
In this paper, we present an Android application which is able to evaluate and analyze the perceived Quality of Experience (QoE) for YouTube service in wireless terminals. To achieve this goal, the application carries out measurements of objective Quality of Service (QoS) parameters, which are then mapped onto subjective QoE (in terms of Mean Opinion Score, MOS) by means of a utility function. Our…
▽ More
In this paper, we present an Android application which is able to evaluate and analyze the perceived Quality of Experience (QoE) for YouTube service in wireless terminals. To achieve this goal, the application carries out measurements of objective Quality of Service (QoS) parameters, which are then mapped onto subjective QoE (in terms of Mean Opinion Score, MOS) by means of a utility function. Our application also informs the user about potential causes that lead to a low MOS as well as provides some hints to improve it. After each YouTube session, the users may optionally qualify the session through an online opinion survey. This information has been used in a pilot experience to correlate the theoretical QoE model with real user feedback. Results from such an experience have shown that the theoretical model (taken from the literature) provides slightly more pessimistic results compared to user feedback. Users seem to be more indulgent with wireless connections, increasing the MOS from the opinion survey in about 20% compared to the theoretical model, which was obtained from wired scenarios.
△ Less
Submitted 19 May, 2014;
originally announced May 2014.
-
Multi-User Coverage Probability of Uplink Cellular Systems: a Stochastic Geometry Approach
Authors:
F. Javier Martin-Vega,
F. Javier Lopez-Martinez,
Gerardo Gomez,
Mari Carmen Aguayo-Torres
Abstract:
We analyze the coverage probability of multi-user uplink cellular networks with fractional power control. We use a stochastic geometry approach where the mobile users are distributed as a Poisson Point Process (PPP), whereas the serving base station (BS) is placed at the origin. Using conditional thinning, we are able to calculate the coverage probability of $k$ users which are allocated a set of…
▽ More
We analyze the coverage probability of multi-user uplink cellular networks with fractional power control. We use a stochastic geometry approach where the mobile users are distributed as a Poisson Point Process (PPP), whereas the serving base station (BS) is placed at the origin. Using conditional thinning, we are able to calculate the coverage probability of $k$ users which are allocated a set of orthogonal resources in the cell of interest, obtaining analytical expressions for this probability considering their respective distances to the serving BS. These expressions give useful insights on the interplay between the power control policy, the interference level and the degree of fairness among different users in the system.
△ Less
Submitted 3 April, 2014;
originally announced April 2014.