
Faissal El BouananiMohammed V University of Rabat | um5a
Faissal El Bouanani
Ph.D
About
148
Publications
30,270
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,027
Citations
Introduction
Additional affiliations
December 2020 - present
September 2016 - December 2016
April 2014 - December 2020
Publications
Publications (148)
Deep neural networks have shown vulnerability to well-designed inputs called adversarial examples. Researchers in industry and academia have proposed many adversarial example defense techniques. However, they offer partial but not full robustness. Thus, complementing them with another layer of protection is a must, especially for mission-critical a...
In this paper, the recently proposed doubly inverted Gamma-Gamma (IGGG) turbulence channel model is considered to analyze the performance of a free-space optical communication system. To this end, the probability density function (PDF) and cumulative distribution function (CDF) of the irradiance fluctuations of an optical wave propagating through a...
In decentralized environments, such as mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs), traditional reputation management systems are not viable due to their dependence on a central authority that is both accessible and trustworthy for all participants. This is particularly challenging in light of the dynamic nature of these net...
Reputation management systems are essential for establishing trust among network users. They are tools for reinforcing cooperation and sanctioning malicious behavior. This importance becomes a requirement in decentralized environments such as mobile ad-hoc networks (MANETs), peer-to-peer systems (P2P), wireless sensor networks (WSNs), or decentrali...
This study examined the error probability performance of polar codes across Fox’s
$H$
-fading (FHF) channels while taking into account in-phase and quadrature-phase imbalance (IQI), as well as residual hardware impairments (RHI). This fading model generalizes most of the commonly used fading and turbulence models where Málaga-
$\mathcal {M}$
tur...
In this article, we develop a general framework for the performance analysis of unmanned aerial vehicle (UAV) aided terahertz (THz) communications under generalized geometric loss, which considers the fluctuations of the UAV's position and orientation alongside the non-orthogonality of the THz beam with respect to the detector plane. In particular,...
The Industrial Internet of Things (IIoT) has been recognised as having the potential to offer substantial benefit to a wide range of industrial sectors. However, the widespread development and deployment of IIoT pose a set of challenges, including the shortage of spectrum resources and network security. Given the heterogeneity of IIoT devices, conv...
Non-orthogonal multiple access (NOMA) was identified as a technology enabler for the fifth generation and beyond networks, due to the prominent advantages achieved when integrating NOMA with other wireless technologies. In this paper, we investigate the interplay between NOMA and generalized space shift keying (GSSK) in a hybrid NOMA-GSSK (N-GSSK)...
Guaranteeing decent secrecy levels in future wireless network generations has gained crucial importance due to the unprecedented increase in wireless connectivity worldwide. In this paper, an enhanced hybrid channel/device-based physical layer authentication (PLA) scheme is proposed. The channel state information (CSI) and device-dependent carrier...
This study investigated the end-to-end performance of a coded dual-hop RF/FSO wireless communication system that operates across both Nakagami-
m
fading and Málaga-
M
atmospheric turbulence channels and are supplied with an amplify-and-forward semi-blind energy harvesting fixed-gain relay. Interestingly, an average bit error probability is obtain...
This paper investigates the joint impact of residual hardware impairment (RHI) and outdated and imperfect channel state information (CSI) on the performance of NOMA-based vehicular networks over
$\alpha$
-
$\mu$
fading channels, while taking into account the effect of imperfect successive interference cancellation (ipSIC). Particularly, we prese...
The importance of 30-day patients’ readmissions (PRs) to intensive unit care stems from the significant cost and mortality risk when the patient’s chosen class (i.e., readmitted or not to the hospital) is incorrect. The overall accuracy of the PRs classification obtained in the literature is still moderate, particularly for machine learning (ML) an...
A novel accurate approximation of the moment-generating function of the sum of independent and identically distributed lognormal random variables relying on Cubic splines is proposed. We demonstrate that our expressions outperform the previous well-known approximations. Besides, the evaluation of such an expression is relatively acceptable compared...
Unlike their offline traditional counterpart, online machine learning models are capable of handling data distribution shifts while serving at the test time. However, they have limitations in addressing this phenomenon. They are either expensive or unreliable. We propose augmenting an online learning approach called test-time adaptation with a cont...
Impairments baseband model in-phase and quadrature-phase Imbalance (IQI) and Residual hardware impairments (RHI) are two key factors degrading the performance of wireless communication systems (WCSs), particularly when high-frequency bands are employed, as in 5G systems and beyond. The impact of either IQI or RHI on the performance of various WCSs...
p>Deep Neural Networks (DDNs) have shown vulnerability to well-designed adversarial examples. Researchers in industry and academia have proposed many adversarial example defense techniques. However, none can provide complete robustness. The cutting-edge defense techniques offer partial reliability. Thus, complementing them with another layer of pro...
In this paper, the strong consistency of the Brennan‐Schwartz diffusion process (BSDP) Euler‐maximum likelihood (EML) parameter estimators is investigated. The Euler‐Maruyama scheme is first utilized to produce a discretized solution process, and then the EML estimation technique is employed to construct explicit forms of the parameter estimator Fo...
In this paper, we quantify the physical layer security of a dual-hop regenerative relaying-based wireless communication system assisted by reconfigurable intelligent surfaces (RISs). In particular, the setup consists of a source node communicating with a destination node via a regenerative relay. In this setup, a RIS is installed in each hop to inc...
MIMO systems have shown to be effective in addressing today’s high demand for WC, particularly next generation (4G and 5G) mobile technologies, by combating the problem of fading and improving the quality and rate of wireless communications. MIMO-systems with space-time block codes (STBC) is a good choice to provide a complete variety with coherent...
The importance of 30-day patients’ readmissions (PRs) to intensive unit care stems from the significant cost and mortality risk when the patient’s chosen class (i.e., readmitted or not to the hospital) is incorrect. The overall accuracy (OA) of the PRs classification obtained in the literature is still moderate, particularly for machine learning (M...
The importance of 30-day patients’ readmissions (PRs) to intensive unit care stems from the significant cost and mortality risk when the patient’s chosen class (i.e., readmitted or not to the hospital) is incorrect. The overall accuracy (OA) of the PRs classification obtained in the literature is still moderate, particularly for machine learning (M...
In this paper, the physical layer security of a dual-hop unmanned aerial vehicle-based wireless network, subject to imperfect channel state information (CSI) and mobility effects, is analyzed. Specifically, a source node $(S)$ communicates with a destination node $(D)$ through a decode-and-forward relay $(R)$, in the presence of two wiretappers $\l...
In this paper, the performance analysis of simultaneous wireless information and power transfer (SWIPT) using time switching (TS) protocol-based amplify-and-forward (AF) dual-hop mixed radio-frequency/free-space optic (RF/FSO) coded and uncoded communication system (CC and UC) is investigated. Specifically, we look at using the One-Step Majority-Lo...
Recently, air pollution has grown significantly, and it can frequently be challenging to identify the sources of contaminants. This article studies the deployment of multi-cooperative unmanned aerial vehicles (UAVs) to look for sources of pollution in an unknown region. Specifically, a probabilistic search strategy based on the Local Particle Swarm...
This paper investigates the intercept probability (IP) performance for a dual-hop multi-secondary user (SU) underlay cognitive-radio networks. Whereby, the relay R is self-powered by harvesting energy from secondary sources using the time switching variant (TS) of simultaneous wireless information and power transfer (SWIPT) protocol. Single-antenna...
In this article, the physical-layer security of a dual-hop unmanned aerial vehicle-based wireless network, subject to imperfect channel state information (CSI) and mobility effects, is analyzed. Specifically, a source node
$(S)$
communicates with a destination node
$(D)$
through a decode-and-forward relay
$(R)$
, in the presence of two wireta...
This paper investigates the performance of maximum-ratio combining (MRC) linear receivers in a massive multiple-input multiple-output (mMIMO) uplink communication system, that in terms of their signal-to-interference-plus-noise ratio (SINR) operating under independent flat Weibull multi-path fading channels (WFCs). Based on a tight approximate prob...
div>Deep Neural Networks (DDNs) have achieved tremendous success in handling various Machine Learning (ML) tasks, such as speech recognition, Natural Language Processing, and image classification. However, they have shown vulnerability to well-designed inputs called adversarial examples. Researchers in industry and academia have proposed many adver...
div>Deep Neural Networks (DDNs) have achieved tremendous success in handling various Machine Learning (ML) tasks, such as speech recognition, Natural Language Processing, and image classification. However, they have shown vulnerability to well-designed inputs called adversarial examples. Researchers in industry and academia have proposed many adver...
The antenna's bandwidth is strongly dependent on its physical properties and the environment where it is located. Nevertheless, for transmitting devices embedded permanently in the soil, the propagation medium's properties are unstable due to dielectric permittivity's spatial and temporal changes. Relying on soil parameters values, we present three...
This paper proposes an optimization strategy for searching moving targets’ locations using cooperative unmanned aerial vehicles (UAVs) in an unknown environment. Such a strategy aims at reducing the overall search time and impact of uncertainties caused by the motion of targets, as well as improving the detection efficiency of UAVs. Specifically, w...
In this paper, the physical layer security of a multi-user jamming-assisted broadcast network in the presence of multiple eavesdroppers. Specifically, a base station (BS) is broadcasting data to multiple end-users via direct links in the presence of multiple passive wiretappers, while both the legitimate users and the eavesdroppers use a maximal-ra...
We investigate the sum rate performance of a generalized space shift keying (GSSK)-aided, non-orthogonal multiple access (NOMA) network. In particular, we consider a multiple-input multiple-output (MIMO) NOMA downlink channel, where the base station employs GSSK modulation to transmit additional information to the NOMA users. We present a novel ene...
Non-orthogonal multiple access (NOMA) is a technology enabler for the fifth generation and beyond networks, which has shown a great flexibility such that it can be readily integrated with other wireless technologies. In this paper, we investigate the interplay between NOMA and generalized space shift keying (GSSK) in a hybrid NOMA-GSSK (N-GSSK) net...
In this work, we investigate the physical layer security
of a jamming-based underlay cognitive satellite-terrestrial network
consisting of a radio frequency link at the first hop and an optical
feeder at the second hop. Particularly, one secondary user (SU) is
transmitting data to an end-user optical ground station through the
aid of a relay satell...
In this letter, the impact of residual hardware impairment (RHI) on the performance of non-orthogonal multiple access (NOMA) is investigated by taking into account the effect of imperfect successive interference cancellation (ipSIC). The new exact and asymptotic pairwise error probability (PEP) expressions with RHI under ipSIC are derived over Rayl...
Impairments baseband model in-phase and quadrature-phase Imbalance (IQI) and Residual hardware impairments (RHI) are two key factors degrading the performance of wireless communication systems (WCSs), particularly when high-frequency bands are employed, as in 5G systems and beyond. The impact of either IQI or RHI on the performance of various WCSs...
Evaluating the sum of independent and not necessarily identically distributed (i.n.i.d) random variables (RVs) is essential to study different variables linked to various scientific fields, particularly, in wireless communication channels. However, it is difficult to evaluate the distribution of this sum when the number of RVs increases. Consequent...
Large intelligent surface (LIS) has recently emerged as a potential enabling technology for 6G networks, offering extended coverage and enhanced energy and spectral efficiency. In this work, motivated by its promising potentials, we investigate the error rate performance of LIS-assisted non-orthogonal multiple access (NOMA) networks. Specifically,...
This paper proposes new accurate approximations for average error probability (AEP) of a communication system employing either M-phase-shift keying (PSK) or differential quaternary PSK with Gray coding (GC-DQPSK) modulation schemes over generalized fading channel. Firstly, new accurate approximations of error probability (EP) of both modulation sch...
Recently, the Fisher-Snedecor F distribution was proposed to model the turbulence in free-space optical (FSO) communications. However, the existing model does not consider pointing error impairment. To fill this gap, in this paper, we derive novel closed-form expressions for the probability density function (PDF) and cumulative distribution functio...
Cognitive radio (CR) is a promising paradigm that comes to address the scarcity of the radio spectrum by providing opportunistic utilization of the underutilized licensed channels to attain higher spectrum efficiency. The efficient use of the vacant portion of the spectrum depends directly on the medium access control (MAC) layer that coordinates f...
Machine Learning (ML), and Deep Learning (DL) in particular, play a vital role in providing smart services to the industry. These techniques however suffer from privacy and security concerns since data is collected from clients and then stored and processed at a central location. Federated Learning (FL), an architecture in which model parameters ar...
The low efficiency of wireless power transfer (WPT) poses a key challenge for energy-constrained wireless networks. To address this issue, in this letter, the integration of intelligent reflecting surface (IRS) into a WPT network is investigated. To this end, an accurate approximation for the probability density function of the end-to-end cascaded...
Machine Learning (ML), and Deep Learning (DL) in particular, play a vital role in providing smart services to the industry. These techniques however suffer from privacy and security concerns since data is collected from clients and then stored and processed at a central location. Federated Learning (FL), an architecture in which model parameters ar...
Nowadays, the cybersecurity issue involves new strategies to protect against advanced threats and unknown attacks. Intrusion detection system (IDS) is considered a robust system dealing with attacks detection, particularly unknown attacks and anomalies. Several IDS-based algorithms have been recently inspected in the literature, among them the well...
By considering the probability density function (PDF) of a generalized Gamma (GG) random variable (RV) evaluated in terms of a proper subset H^{1,0}_{1,1} class of Fox's H-function (FHF) and the moment-based approximation to estimate the H-function parameters, a closed-form tight approximate expression for the distribution of the sum of independent...
This work investigates the performance of a dual-hop energy harvesting-based fixed-gain amplify-and-forward relaying communication system, subject to fading impairments. We consider a source node (S) communicating with a destination node (D), either directly or through a fixed distant relay (R), which harvests energy from its received signals and u...
Hybrid terrestrial-satellite transmission systems have been among hottest spots in the wireless communication industry due to the high demand for global high data rates. In such systems, free-space optical (FSO) technology is advocated for assessing the feeder links (ground-satellite) in order to fulfill high data rates requirements and provide a l...
In this work, we investigate the physical layer security of a jamming-based underlay cognitive hybrid satellite-terrestrial network {consisting of a} radio frequency link at the first hop and an optical feeder at the second hop. Particularly, one secondary user (SU) is transmitting data {to an end-user} optical ground station {($\boldsymbol{D}$)} t...
In this paper, a very accurate approximation method for the statistics of the sum of Málaga-M random variates with pointing error (MRVs) is proposed. In particular, the probability density function of MRV is approximated by a Fox's H-function through the moment-based approach. Then, the respective moment-generating function of the sum of N MRVs is...
This paper inspects the error rate and the capacity performance of a dual-hop energy harvesting (EH)-based fixed-gain amplify-and-forward relaying communication system, subject to fading impairments. We consider a source node (S) communicating with a destination node (D) via a relay node (R) equipped with a finite-size battery, which harvests energ...
The wireless communication services are in great demand nowadays, especially in 5G mobile technologies and beyond. In this frame, multiple-input multiple-output (MIMO) systems have shown a good efficiency by combating the phenomenon of fading as well as enhancing the performance of wireless communication systems. Particularly, MIMO systems with spa...
The Gaussian Q-function (GQF) and its integer powers are quite versatile in various fields of science. In most applications, it is involved in intractable integrals for which closed-form expressions cannot be evaluated. In this paper, six new bounds for the GQF are presented and their tightness and simplicity are discussed compared to existing ones...
In this paper, a very accurate approximation method for the statistics of the sum of M\'{a}laga-$\mathcal{M}$ random variates with pointing error (MRVs) is proposed. In particular, the probability density function of MRV is approximated by a Fox's $H$-function through the moment-based approach. Then, the respective moment-generating function of the...
Large intelligent surface (LIS) has recently emerged as a potential enabling technology for 6G networks, offering extended coverage and enhanced energy and spectral efficiency. In this work, motivated by its promising potentials, we investigate the error rate performance of LIS-assisted non-orthogonal multiple access (NOMA) networks. Specifically,...
Hybrid terrestrial-satellite (HTS) communication systems have gained a tremendous amount of interest recently due to the high demand for global high data rates. Conventional satellite communications operate in the conventional Ku (12 GHz) and Ka (26.5-40 GHz) radio-frequency bands for assessing the feeder link, between the ground gateway and the sa...
This paper proposes new accurate approximations for average symbol error probability (ASEP) of a communication system employing either M-phase-shift keying (PSK) or differential quaternary PSK (DQPSK) modulation schemes, with Gray coding over κ-μ shadowed fading channel. Firstly, new accurate approximations of symbol error probability (SEP) of both...
In this paper, the performance of a dual-hop energy harvesting-based fixed-gain amplify-and-forward (AF) relaying communication system, subject to fading impairments, is investigated. We consider a source node ($S$) communicating with a destination node ($D$) through a fixed distant relay ($R$), which harvests energy from its received signals and u...
Hybrid terrestrial-satellite (HTS) communication systems have gained a tremendous amount of interest recently due to the high demand for global high data rates. Conventional satellite communications operate in the conventional Ku (12 GHz) and Ka (26.5-40 GHz) radio-frequency bands for assessing the feeder link, between the ground gateway and the sa...
In this paper, the physical layer security of a dual-hop underlay uplink cognitive radio network is investigated over Nakagami-m fading channels. Specifically, multiple secondary sources (Si)1≤i≤N are taking turns in accessing the licensed spectrum of the primary users and communicating with a multi-antenna secondary base station (D) through the ai...
p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; font: 9.0px Helvetica} span.s1 {font: 7.5px Helvetica}
xAbstract—In this paper, the physical layer security of a dualhop
underlay uplink cognitive radio network is investigated over
Nakagami-m fading channels. Specifically, multiple secondary
sources are taking turns in accessing the licensed
spectrum of...
In this paper, the physical layer security of a dual-hop underlay uplink cognitive radio network is investigated over Nakagami-m fading channels. Specifically, multiple secondary sources are taking turns in accessing the licensed spectrum of the primary users and communicating with a multiantenna secondary base station D through the aid of a multia...
Physical layer security is an important and timely topic in the research of future wireless systems and it constitutes a part of the Internet of Things (IoT) notion. IoT oriented systems are largely characterized by a stringent quality of service and enhanced security requirements, which comes at a cost of increased computational complexity that ne...
The present contribution investigates the physical layer security in a cognitive radio network (CRN). To this end, we consider an underlay uplink CRN consisting of multiple secondary sources, a single-antenna secondary base station, and multiple eavesdroppers. In addition, we assume that the secondary sources transmit their data sequentially and th...
The present contribution investigates the physical layer security in a cognitive radio network (CRN). To this end, we consider an underlay uplink CRN consisting of multiple secondary sources, a single-antenna secondary base station, and multiple eavesdroppers. In addition, we assume that the secondary sources transmit their data sequentially and th...
We investigate the physical layer security of a relay-assisted underlay cognitive radio network with simultaneous wireless information and power transfer (SWIPT). To this end, we consider a secondary network comprising a secondary source S, one secondary user (SU) relay R, one SU destination D, one primary user (PU) transmitter, and one PU receiver...
We investigate the physical layer security of a relay-assisted underlay cognitive radio network with simultaneous wireless information and power transfer (SWIPT). To this end, we consider a secondary network comprising a secondary source S, one secondary user (SU) relay R, one SU destination D, one primary user (PU) transmitter, and one PU receiver...