Skip to main content

Showing 1–10 of 10 results for author: Shah, S W

Searching in archive cs. Search in all archives.
.
  1. arXiv:2208.05184  [pdf

    eess.AS cs.SD

    Preserving the beamforming effect for spatial cue-based pseudo-binaural dereverberation of a single source

    Authors: Sania Gul, Muhammad Salman Khan, Syed Waqar Shah

    Abstract: Reverberations are unavoidable in enclosures, resulting in reduced intelligibility for hearing impaired and non native listeners and even for the normal hearing listeners in noisy circumstances. It also degrades the performance of machine listening applications. In this paper, we propose a novel approach of binaural dereverberation of a single speech source, using the differences in the interaural… ▽ More

    Submitted 10 August, 2022; originally announced August 2022.

    Comments: 25 pages, 7 figures

  2. arXiv:2208.04626  [pdf

    eess.AS cs.SD

    Recycling an anechoic pre-trained speech separation deep neural network for binaural dereverberation of a single source

    Authors: Sania Gul, Muhammad Salman Khan, Syed Waqar Shah, Ata Ur-Rehman

    Abstract: Reverberation results in reduced intelligibility for both normal and hearing-impaired listeners. This paper presents a novel psychoacoustic approach of dereverberation of a single speech source by recycling a pre-trained binaural anechoic speech separation neural network. As training the deep neural network (DNN) is a lengthy and computationally expensive process, the advantage of using a pre-trai… ▽ More

    Submitted 9 August, 2022; originally announced August 2022.

    Comments: 15 pages, 4 figures

  3. arXiv:2204.13885  [pdf, other

    cs.CR

    Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism

    Authors: Mohammad Reza Nosouhi, Syed W. Shah, Lei Pan, Yevhen Zolotavkin, Ashish Nanda, Praveen Gauravaram, Robin Doss

    Abstract: The evolution of quantum computers poses a serious threat to contemporary public-key encryption (PKE) schemes. To address this impending issue, the National Institute of Standards and Technology (NIST) is currently undertaking the Post-Quantum Cryptography (PQC) standardization project intending to evaluate and subsequently standardize the suitable PQC scheme(s). One such attractive approach, call… ▽ More

    Submitted 13 July, 2022; v1 submitted 29 April, 2022; originally announced April 2022.

  4. Statistical QoS Analysis of Reconfigurable Intelligent Surface-assisted D2D Communication

    Authors: Syed Waqas Haider Shah, Adnan Noor Mian, Shahid Mumtaz, Anwer Al-Dulaimi, Chih-Lin I, Jon Crowcroft

    Abstract: This work performs the statistical QoS analysis of a Rician block-fading reconfigurable intelligent surface (RIS)-assisted D2D link in which the transmit node operates under delay QoS constraints. First, we perform mode selection for the D2D link, in which the D2D pair can either communicate directly by relaying data from RISs or through a base station (BS). Next, we provide closed-form expression… ▽ More

    Submitted 7 April, 2022; originally announced April 2022.

    Comments: Accepted for publication in IEEE Transactions on Vehicular Technology

  5. arXiv:2107.12217  [pdf, other

    cs.IT eess.SP

    Effective Capacity Analysis of HARQ-enabled D2D Communication in Multi-Tier Cellular Networks

    Authors: Syed Waqas Haider Shah, Muhammad Mahboob-ur-Rahman, Adnan Noor Mian, Octavia A. Dobre, Jon Crowcroft

    Abstract: This work does the statistical quality-of-service (QoS) analysis of a block-fading device-to-device (D2D) link in a multi-tier cellular network that consists of a macro-BS (BSMC) and a micro-BS (BSmC) which both operate in full-duplex (FD) mode. For the D2D link under consideration, we first formulate the mode selection problem-whereby D2D pair could either communicate directly, or, through the BS… ▽ More

    Submitted 26 July, 2021; originally announced July 2021.

    Comments: Accepted for publication in IEEE Transactions on Vehicular Technology

  6. Protocol Stack Perspective For Low Latency and Massive Connectivity in Future Cellular Networks

    Authors: Syed Waqas Haider Shah, Adnan Noor Mian, Shahid Mumtaz, Miaowen Wen, T. Hong, Michel Kadoch

    Abstract: With the emergence of Internet-of-Things (IoT) and ever-increasing demand for the newly connected devices, there is a need for more effective storage and processing paradigms to cope with the data generated from these devices. In this study, we have discussed different paradigms for data processing and storage including Cloud, Fog, and Edge computing models and their suitability in integrating wit… ▽ More

    Submitted 22 May, 2021; originally announced May 2021.

    Comments: IEEE International Conference on Communications (ICC-2019)

  7. Energy-Efficient MAC for Cellular IoT: State-of-the-Art, Challenges, and Standardization

    Authors: Syed Waqas Haider Shah, Adnan Noor Mian, Adnan Aijaz, Junaid Qadir, Jon Crowcroft

    Abstract: In the modern world, the connectivity-as-we-go model is gaining popularity. Internet-of-Things (IoT) envisions a future in which human beings communicate with each other and with devices that have identities and virtual personalities, as well as sensing, processing, and networking capabilities, which will allow the develo** of smart environments that operate with little or no human intervention.… ▽ More

    Submitted 9 March, 2021; originally announced March 2021.

    Journal ref: IEEE Transactions on Green Communications and Networking, Feb. 2021

  8. arXiv:2010.05144  [pdf, ps, other

    cs.CR

    Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication

    Authors: Syed W. Shah, Naeem F. Syed, Arash Shaghaghi, Adnan Anwar, Zubair Baig, Robin Doss

    Abstract: Continuous Authentication (CA) has been proposed as a potential solution to counter complex cybersecurity attacks that exploit conventional static authentication mechanisms that authenticate users only at an ingress point. However, widely researched human user characteristics-based CA mechanisms cannot be extended to continuously authenticate Internet of Things (IoT) devices. The challenges are ex… ▽ More

    Submitted 10 October, 2020; originally announced October 2020.

    Comments: This is a copy of the accepted version at The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2020) [Core Rank: A]

  9. arXiv:2002.05093  [pdf, other

    cs.CR cs.IT eess.SP

    On the Effective Capacity of an Underwater Acoustic Channel under Impersonation Attack

    Authors: Waqas Aman, Zeeshan Haider, S. Waqas H. Shah, M. Mahboob Ur Rahman, Octavia A. Dobre

    Abstract: This paper investigates the impact of authentication on effective capacity (EC) of an underwater acoustic (UWA) channel. Specifically, the UWA channel is under impersonation attack by a malicious node (Eve) present in the close vicinity of the legitimate node pair (Alice and Bob); Eve tries to inject its malicious data into the system by making Bob believe that she is indeed Alice. To thwart the i… ▽ More

    Submitted 12 February, 2020; originally announced February 2020.

    Comments: This paper is accepted for presentation at IEEE International Conference on Communications (ICC) 2020

  10. arXiv:1809.07855  [pdf, other

    cs.NI

    Energy-Efficient Mechanism for Smart Communication in Cellular Networks

    Authors: Syed Waqas Haider Shah, Ahmad Talal Riaz, Zahoor Fatima

    Abstract: Internet-of-things (IoT) is gaining popularity in recent times. Cellular network can be an appropriate solution for the IoT connectivity. With the exponential increase in the number of connected IoT devices, energy consumption is a bottleneck for wireless connectivity solutions. In this work, we proposed a scheme to decrease the power consumption of a base station of a cell. The maximum power cons… ▽ More

    Submitted 29 April, 2019; v1 submitted 5 September, 2018; originally announced September 2018.

    Comments: 5 pages, 3 figures