
Ekram HossainUniversity of Manitoba | UMN
Ekram Hossain
About
683
Publications
154,771
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
37,973
Citations
Publications
Publications (683)
Multi-task semantic communication can serve multiple learning tasks using a shared encoder model. Existing models have overlooked the intricate relationships between features extracted during an encoding process of tasks. This paper presents a new graph attention inter-block (GAI) module to the encoder/transmitter of a multi-task semantic communica...
Multi-task semantic communication can serve multiple learning tasks using a shared encoder model. Existing models have overlooked the intricate relationships between features extracted during an encoding process of tasks. This paper presents a new graph attention inter-block (GAI) module to the encoder/transmitter of a multi-task semantic communica...
Personalized federated learning (PFL), e.g., the renowned Ditto, strikes a balance between personalization and generalization by conducting federated learning (FL) to guide personalized learning (PL). While FL is unaffected by personalized model training, in Ditto, PL depends on the outcome of the FL. However, the clients’ concern about their priva...
Unmanned aerial vehicles (UAVs) are crucial for enhancing global connectivity, but the UAV transmissions are vulnerable to limited onboard energy and signal blockages in dense urban areas. Reconfigurable intelligent surfaces (RISs) can mitigate blockages, while allowing for fewer on-board antennas and reduced energy consumption for UAVs. In this pa...
We leverage covert communication to enhance the security of a large-scale multi-tier Low Earth Orbit (LEO) satellite network against vigilant adversarial terrestrial Base Stations (BSs) aiming at detecting satellite transmissions. This approach involves deploying massive LEO satellites at different altitudes around Earth to form a multi-tier networ...
This letter presents a new over-the-air federated learning (OTA-FL) system supported by a user-centric cell-free (UCCF) network. We propose a two-level hierarchical deep reinforcement learning (HDRL) framework that minimizes mean squared error (MSE) derived from convergence analysis by jointly optimizing AP-device association (ADA) and power contro...
This paper analyzes the impact of imperfect communication channels on decentralized federated learning (D-FL) and subsequently determines the optimal number of local aggregations per training round, adapting to the network topology and imperfect channels. We start by deriving the bias of locally aggregated D-FL models under imperfect channels from...
Dual-function-radar-communication (DFRC) is a promising candidate technology for next-generation networks. By integrating hybrid analog-digital (HAD) beamforming into a multi-user millimeter-wave (mmWave) DFRC system, we design a new reconfigurable subarray (RS) architecture and jointly optimize the HAD beamforming to maximize the communication sum...
Channel estimation in reconfigurable intelligent surfaces (RIS)-aided systems is crucial for optimal configuration of the RIS and various downstream tasks such as user localization. In RIS-aided systems, channel estimation involves estimating two channels for the user-RIS (UE-RIS) and RIS-base station (RIS-BS) links. In the literature, two approach...
Channel state information (CSI) estimation is a critical issue in the design of modern massive multiple-input multiple-output (mMIMO) networks. With the increasing number of users, assigning orthogonal pilots to everyone incurs a large overhead that strongly penalizes the spectral efficiency (SE) of the system. It becomes thus necessary to reuse pi...
Most research studies on deep learning (DL) applied to the physical layer of wireless communication do not put forward the critical role of the accuracy-generalization trade-off in developing and evaluating practical algorithms. To highlight the disadvantage of this common practice, we revisit a data decoding example from one of the first papers in...
This paper studies a simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS)-assisted wireless system where a multi-antenna base station (BS) transmits both wireless information and energy-carrying signals to single-antenna users. To explore the trade-off between spectral efficiency (SE) and energy efficiency (EE) i...
We consider an integrated sensing and communication (ISAC) system, in which a simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) assists a base station in transmitting communication signals to mobile users and conducting sensing tasks toward specific targets. We formulate a transmit beamforming and phase shift...
The Simultaneously Transmitting and Reflecting Reconfigurable Intelligent Surface (STAR-RIS) technology is an innovative approach that aims to enhance the performance of sixth-generation (6G) wireless networks. This study focuses on a multi-STAR-RIS and full-duplex (FD) communication system aimed at providing ultra-reliable low-latency communicatio...
xG wireless networks require more stringent performance levels. New technologies such as RIS and RSMA are candidates for meeting some of the performance requirements, including higher user rates at reduced costs. RSMA provides a new way of mixing the messages of multiple users, and the RIS provides a controllable wireless environment. This paper pr...
Multi-access edge computing (MEC) is one of the enabling technologies for high-performance computing at the edge of the 6 G networks, supporting high data rates and ultra-low service latency. Although MEC is a remedy to meet the growing demand for computation-intensive applications, the scarcity of resources at the MEC servers degrades its performa...
We propose a variational inference (VI)-based channel state information (CSI) estimation approach in a fully-passive reconfigurable intelligent surface (RIS)-aided mmWave single-user single-input multiple-output (SIMO) communication system. Specifically, we first propose a VI-based joint channel estimation method to estimate the user-equipment (UE)...
Photon counting is an effective technique to detect low-power optical signals in underwater optical wireless communications (UOWC), but undergoes signal-dependent Poisson shot noises that lead to intractable data rate expressions and hinder effective power allocation of photon-counting systems. This paper presents a new approach to the optimal powe...
We aim to secure a large-scale device-to-device (D2D) network against adversaries. The D2D network underlays a downlink cellular network to reuse the cellular spectrum and is enabled for simultaneous wireless information and power transfer (SWIPT). In the D2D network, the transmitters communicate with the receivers, and the receivers extract inform...
Integrating the multitude of emerging internet of things (IoT) applications with diverse requirements in beyond fifth generation (B5G) networks necessitates the coexistence of enhanced mobile broadband (eMBB) and ultra-reliable low-latency communication (URLLC) services. However, bandwidth limited and congested sub-6GHz bands are incapable of fulfi...
Downlink transmission of a non-orthogonal multiple access visible light communication system empowered by an unmanned aerial vehicles (UAV) is considered for multiplexing enhanced mobile broadband (eMBB) and massive machine type communication (mMTC) services. Accordingly, a resource allocation problem of joint transmit power control and motion traj...
We exploit both covert communication and friendly jamming to propose a friendly jamming-assisted covert communication and use it to doubly secure a large-scale device-to-device (D2D) network against eavesdroppers (i.e., wardens). The D2D transmitters defend against the wardens by: 1) hiding their transmissions with enhanced covert communication, an...
Data-driven machine learning (ML) is promoted as one potential technology to be used in next-generation wireless systems. This led to a large body of research work that applies ML techniques to solve problems in different layers of the wireless transmission link. However, most of these applications rely on supervised learning which assumes that the...
We aim to develop a system-level security solution for a large-scale device-to-device (D2D) network against adversaries based on covert communication. The D2D network underlays a downlink cellular network to reuse the cellular spectrum and is enabled for simultaneous wireless information and power transfer (SWIPT). In the D2D network, the D2D trans...
Security is an issue in non-orthogonal multiple access (NOMA) and partial-NOMA because a user may decode the message of its paired-user with which it shares a resource element (RE). Three scenarios are studied where, of the paired-users, the eavesdropper is: 1) an actively malicious strong-user, 2) a passive strong-user, 3) an actively malicious we...
Metaverse is an evolving orchestrator of the next-generation Internet architecture that produces an immersive and self-adapting virtual world in which humans perform activities similar to those in the real world, such as playing sports, doing work, and socializing. It is becoming a reality and is driven by ever-evolving advanced technologies such a...
Metaverse is an evolving orchestrator of the next-generation Internet architecture that produces an immersive and self-adapting virtual world in which humans perform activities similar to those in the real world, such as playing sports, doing work, and socializing. It is becoming a reality and is driven by ever-evolving advanced technologies such a...
Passive beamforming in reconfigurable intelligent
surfaces (RISs) enables a feasible and efficient way of communication when the RIS reflection coefficients are precisely adjusted.
In this paper, we present a framework to track the RIS reflection
coefficients with the aid of deep learning from a time-series
prediction perspective in a terahertz (TH...
In this paper, we consider the computation offloading problem from mobile users in a heterogeneous vehicular edge computing scenario and focus on the network and base station selection problem, where the different networks have different traffic loads. In a fast-varying vehicular environment, computation offloading of users is strongly affected by...
This work studies the meta distribution (MD) in a two-user partial non-orthogonal multiple access (pNOMA) network. Compared to NOMA where users fully share a resourceelement, pNOMA allows sharing only a fraction a of the resourceelement. The MD is computed via moment-matching using the first two moments where reduced integral expressions are derive...
This chapter develops an iterative optimization framework to maximize the data rate of a given user by jointly optimizing the mode selection (i.e. direct mode where user is served by direct base station (BS) transmissions and indirect mode where user is served by intelligent reflecting surface (IRS)‐assisted transmissions) along with IRS phase shif...
With the proliferation of deep learning techniques for wireless communication, several works have adopted learning-based approaches to solve the channel estimation problem. While these methods are usually promoted for their computational efficiency at inference time, their use is restricted to specific stationary training settings in terms of commu...
We investigate the age-limited capacity of the Gaussian many channel with total
N
users, out of which a random subset of
K<sub>a</sub>
users are active in any transmission period, and a large-scale antenna array at the base station (BS). In an uplink scenario where the transmission power is fixed among the users, we consider the setting in whic...
Delivering wireless ultrahigh-speed access at wider coverage is becoming considerably challenging due to the prohibitive investment costs per user and the necessary shift to range-limited millimeter-wave (mmWave) transmissions. Reconfigurable intelligent surfaces (RIS) are expected to extend the reach of mmWave and TeraHz signals more cost-effectiv...
We exploit both covert communication and friendly jamming to propose a friendly jamming-assisted covert communication and use it to doubly secure a large-scale device-to-device (D2D) network against eavesdroppers (i.e., wardens). The D2D transmitters defend against the wardens by: 1) hiding their transmissions with enhanced covert communication, an...
In Internet of Electric Vehicles (IoEV), mobile charging stations (MCSs) can be deployed to complement fixed charging stations. Currently, the strategy of MCSs is to move towards the EVs with insufficient energy (IEVs) only after being requested, which is not efficient. However, similar to online car-hailing services, more IEVs could be charged and...
For enabling automatic deployment and management of cellular networks, the concept of self-organizing network (SON) was introduced. SON capabilities can enhance network performance, improve service quality, and reduce operational and capital expenditure (OPEX/CAPEX). As an important component in SON, self-healing is defined as a paradigm where the...
Load balancing has become a key technique to handle the increasing traffic demand and improve the user experience. It evenly distributes the traffic across network resources by offloading users from overloaded base stations or channels to less crowded ones. Load balancing is a multi-objective optimization problem involving the automatic adjustment...
Over the past decade, Unmanned Aerial Vehicles (UAVs) have provided pervasive, efficient, and cost-effective solutions for data collection and communications. Their excellent mobility, flexibility, and fast deployment enable UAVs to be extensively utilized in agriculture, medical, rescue missions, smart cities, and intelligent transportation system...
In this article, we first present the vision, key performance indicators, key enabling techniques (KETs), and services of 6G wireless networks. Then, we highlight a series of general resource management (RM) challenges as well as unique RM challenges corresponding to each KET. The unique RM challenges in 6G necessitate the transformation of existin...
We study the joint user association and resource allocation problem in both uplink (UL) and downlink (DL) for full-duplex heterogeneous cellular networks (HCNs), wherein base stations (BSs) are densely deployed with reusable subchannels and highly variable transmit powers. To reap the benefits of BS densification, decoupled multiple-association (DM...
In a cell-free network, a large number of mobile devices are served simultaneously by several base stations (BSs)/access points(APs) using the same time/frequency resources. However, this creates high signal processing demands (e.g., for beamforming) at the transmitters and receivers. In this work, we develop centralized and distributed deep reinfo...
In a cell-free wireless network, distributed access points (APs) jointly serve all user equipments (UEs) within their coverage area by using the same time/frequency resources. In this paper, we develop a novel downlink cell-free multiple-input multiple-output (MIMO) millimeter wave (mmWave) network architecture that enables all APs and UEs to dynam...
This paper introduces a novel approach of utilizing the reconfigurable intelligent surface (RIS) for joint data modulation and signal beamforming in a multi-user downlink cellular network by leveraging the idea of backscatter communication. We present a general framework in which the RIS, referred to as modulating intelligent surface (MIS) in this...
As the long-term evolution (LTE) system is reaching maturity and the fifth-generation (5G) systems are being commercially deployed, researchers have turned their attention to the development of next-generation wireless networks. Compared to current wireless networks, on the one hand, next-generation wireless networks are expected to achieve signifi...
Due to the explosive growth in the number of wireless devices and diverse wireless services, such as virtual/augmented reality and Internet-of-Everything, next generation wireless networks face unprecedented challenges caused by heterogeneous data traffic, massive connectivity, and ultra-high bandwidth efficiency and ultra-low latency requirements....
As the long-term evolution (LTE) system is reaching maturity and the fifth-generation (5G) systems are being commercially deployed, researchers have turned their attention to the development of next-generation wireless networks. Compared to current wireless networks, on the one hand, next-generation wireless networks are expected to achieve signifi...
Using stochastic geometry tools, we develop a comprehensive framework to analyze the downlink performance of various types of users (e.g., users served by direct base station (BS) transmissions and indirect intelligent reflecting surface (IRS)-assisted transmissions) in a cellular network with multiple BSs and IRSs. For the proposed users, we provi...
Bluetooth Low Energy (BLE) has become the de facto communication protocol for the Internet of Things (IoT) and smart wearable devices for its ultra-low energy consumption, ease of development, good enough network coverage, and data transfer speed. Due to the simplified design of this protocol, there have been lots of security and privacy vulnerabil...
In multi-UAV networks, the downlink (DL) and uplink (UL) associations between a UAV and a user equipment (UE) is typically coupled, which restricts each UE to associate to the same UAV for both DL and UL. However, this mode may not be efficient since UAV networks can be heterogeneous (e.g., multi-tier UAV networks) and can experience high link unce...
The efficient administration of network resources in Multi-Access Edge Computing (MEC) is an active research topic these days. Task sharing, in particular, is one of the fundamental problems regarding MEC architectures although the existing literature approaches the topic mostly from the mobile user point of view. In this article, we present the ch...
As one of the most promising applications in future Internet of Things, Internet of Vehicles (IoV) has been acknowledged as a fundamental technology for developing the Intelligent Transportation Systems in smart cities. With the emergence of the sixth generation (6G) communications technologies, massive network infrastructures will be densely deplo...
While 5G standards are being developed, research is moving toward designing the next generation of communications (e.g., 5.5G and 6G) which are expected to provide data rates of the order of 1 Tb/s using frequency bands in the range of 100 GHz to 3 THz. In addition to providing massive capacity and connectivity by exploiting new network architectur...
As one of the most promising applications in future Internet of Things, Internet of Vehicles (IoV) has been acknowledged as a fundamental technology for developing the Intelligent Transportation Systems in smart cities. With the emergence of the sixth generation (6G) communications technologies, massive network infrastructures will be densely deplo...
This paper introduces a novel approach of utilizing the reconfigurable intelligent surface (RIS) for joint data modulation and signal beamforming in a multi-user downlink cellular network by leveraging the idea of backscatter communication. We present a general framework in which the RIS, referred to as modulating intelligent surface (MIS) in this...
The performance of wireless networks is fundamentally limited by the aggregate interference, which depends on the spatial distributions of the interferers, channel conditions, and user traffic patterns (or queueing dynamics). These factors usually exhibit spatial and temporal correlations and thus make the performance of large-scale networks enviro...
Due to the explosive growth in the number of wireless devices and diverse wireless services, such as virtual/augmented reality and Internet-of-Everything, next generation wireless networks face unprecedented challenges caused by heterogeneous data traffic, massive connectivity, and ultra-high bandwidth efficiency and ultra-low latency requirements....
Using stochastic geometry tools, we develop a comprehensive framework to analyze the downlink coverage probability, ergodic capacity, and energy efficiency (EE) of various types of users (e.g., users served by direct base station (BS) transmissions and indirect intelligent reflecting surface (IRS)-assisted transmissions) in a cellular network with...
We consider an Intelligent Reflecting Surface (IRS)-aided multiple-input single-output (MISO) system for downlink transmission. We compare the performance of Deep Reinforcement Learning (DRL) and conventional optimization methods in finding optimal phase shifts of the IRS elements to maximize the user signal-to-noise (SNR) ratio. Furthermore, we ev...
Multi-Agent Reinforcement Learning (MARL) is a challenging subarea of Reinforcement Learning due to the non-stationarity of the environments and the large dimensionality of the combined action space. Deep MARL algorithms have been applied to solve different task offloading problems. However, in real-world applications, information required by the a...
This paper tackles the problem of joint active and passive beamforming optimization for an intelligent reflective surface (IRS)-assisted multi-user downlink multiple-input multiple-output (MIMO) communication system under both ideal and practical IRS phase shifts. We aim to maximize the spectral efficiency of the users by minimizing the sum mean sq...
Automatic repeat request (ARQ) schemes, and in particular hybrid-ARQ (HARQ) schemes, which jointly adopt forward error correction (FEC) and ARQ, are essential to provide reliable data transmission in wireless communications systems. However, the feedback from the receiver to the transmitter and the retransmission process used in ARQ incurs signific...
Distributed machine learning (DML) techniques, such as federated learning, partitioned learning, and distributed reinforcement learning, have been increasingly applied to wireless communications. This is due to improved capabilities of terminal devices, explosively growing data volume, congestion in the radio interfaces, and increasing concern of d...
Code-expanded Random Access (CeRA) is a promising technique for supporting massive machine-type communications in cellular networks. However, its potentiality is limited by code ambiguity, which results from the inference of a larger number of codewords than those actually transmitted. In this letter, we propose a random access (RA) scheme to allev...
Code-expanded Random Access (CeRA) is a promising technique for supporting mMTC in cellular IoT networks. However, its potentiality is limited by code ambiguity, which results from the inference of a larger number of codewords than those actually transmitted. In this letter, we propose a random access scheme to alleviate this problem by allowing de...
In this paper, we consider the computation offloading problem from mobile users in a heterogeneous vehicular edge computing scenario and focus on the network and base station selection problem, where the different networks have different traffic loads. In a fast-varying vehicular environment, computation offloading of users is strongly affected by...