Faissal El Bouanani

Faissal El Bouanani
Mohammed V University of Rabat | um5a

Ph.D

About

148
Publications
30,270
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,027
Citations
Additional affiliations
December 2020 - present
Mohammed V University of Rabat
Position
  • Professor
September 2016 - December 2016
Western Michigan University
Position
  • Professor
April 2014 - December 2020
Mohammed V University of Rabat
Position
  • Professor (Associate)

Publications

Publications (148)
Article
Deep neural networks have shown vulnerability to well-designed inputs called adversarial examples. Researchers in industry and academia have proposed many adversarial example defense techniques. However, they offer partial but not full robustness. Thus, complementing them with another layer of protection is a must, especially for mission-critical a...
Article
In this paper, the recently proposed doubly inverted Gamma-Gamma (IGGG) turbulence channel model is considered to analyze the performance of a free-space optical communication system. To this end, the probability density function (PDF) and cumulative distribution function (CDF) of the irradiance fluctuations of an optical wave propagating through a...
Article
Full-text available
In decentralized environments, such as mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs), traditional reputation management systems are not viable due to their dependence on a central authority that is both accessible and trustworthy for all participants. This is particularly challenging in light of the dynamic nature of these net...
Article
Full-text available
Reputation management systems are essential for establishing trust among network users. They are tools for reinforcing cooperation and sanctioning malicious behavior. This importance becomes a requirement in decentralized environments such as mobile ad-hoc networks (MANETs), peer-to-peer systems (P2P), wireless sensor networks (WSNs), or decentrali...
Article
Full-text available
This study examined the error probability performance of polar codes across Fox’s $H$ -fading (FHF) channels while taking into account in-phase and quadrature-phase imbalance (IQI), as well as residual hardware impairments (RHI). This fading model generalizes most of the commonly used fading and turbulence models where Málaga- $\mathcal {M}$ tur...
Article
In this article, we develop a general framework for the performance analysis of unmanned aerial vehicle (UAV) aided terahertz (THz) communications under generalized geometric loss, which considers the fluctuations of the UAV's position and orientation alongside the non-orthogonality of the THz beam with respect to the detector plane. In particular,...
Article
The Industrial Internet of Things (IIoT) has been recognised as having the potential to offer substantial benefit to a wide range of industrial sectors. However, the widespread development and deployment of IIoT pose a set of challenges, including the shortage of spectrum resources and network security. Given the heterogeneity of IIoT devices, conv...
Article
Full-text available
Non-orthogonal multiple access (NOMA) was identified as a technology enabler for the fifth generation and beyond networks, due to the prominent advantages achieved when integrating NOMA with other wireless technologies. In this paper, we investigate the interplay between NOMA and generalized space shift keying (GSSK) in a hybrid NOMA-GSSK (N-GSSK)...
Article
Full-text available
Guaranteeing decent secrecy levels in future wireless network generations has gained crucial importance due to the unprecedented increase in wireless connectivity worldwide. In this paper, an enhanced hybrid channel/device-based physical layer authentication (PLA) scheme is proposed. The channel state information (CSI) and device-dependent carrier...
Article
Full-text available
This study investigated the end-to-end performance of a coded dual-hop RF/FSO wireless communication system that operates across both Nakagami- m fading and Málaga- M atmospheric turbulence channels and are supplied with an amplify-and-forward semi-blind energy harvesting fixed-gain relay. Interestingly, an average bit error probability is obtain...
Article
This paper investigates the joint impact of residual hardware impairment (RHI) and outdated and imperfect channel state information (CSI) on the performance of NOMA-based vehicular networks over $\alpha$ - $\mu$ fading channels, while taking into account the effect of imperfect successive interference cancellation (ipSIC). Particularly, we prese...
Article
The importance of 30-day patients’ readmissions (PRs) to intensive unit care stems from the significant cost and mortality risk when the patient’s chosen class (i.e., readmitted or not to the hospital) is incorrect. The overall accuracy of the PRs classification obtained in the literature is still moderate, particularly for machine learning (ML) an...
Conference Paper
A novel accurate approximation of the moment-generating function of the sum of independent and identically distributed lognormal random variables relying on Cubic splines is proposed. We demonstrate that our expressions outperform the previous well-known approximations. Besides, the evaluation of such an expression is relatively acceptable compared...
Preprint
Full-text available
Unlike their offline traditional counterpart, online machine learning models are capable of handling data distribution shifts while serving at the test time. However, they have limitations in addressing this phenomenon. They are either expensive or unreliable. We propose augmenting an online learning approach called test-time adaptation with a cont...
Article
Impairments baseband model in-phase and quadrature-phase Imbalance (IQI) and Residual hardware impairments (RHI) are two key factors degrading the performance of wireless communication systems (WCSs), particularly when high-frequency bands are employed, as in 5G systems and beyond. The impact of either IQI or RHI on the performance of various WCSs...
Preprint
Full-text available
p>Deep Neural Networks (DDNs) have shown vulnerability to well-designed adversarial examples. Researchers in industry and academia have proposed many adversarial example defense techniques. However, none can provide complete robustness. The cutting-edge defense techniques offer partial reliability. Thus, complementing them with another layer of pro...
Article
In this paper, the strong consistency of the Brennan‐Schwartz diffusion process (BSDP) Euler‐maximum likelihood (EML) parameter estimators is investigated. The Euler‐Maruyama scheme is first utilized to produce a discretized solution process, and then the EML estimation technique is employed to construct explicit forms of the parameter estimator Fo...
Preprint
Full-text available
In this paper, we quantify the physical layer security of a dual-hop regenerative relaying-based wireless communication system assisted by reconfigurable intelligent surfaces (RISs). In particular, the setup consists of a source node communicating with a destination node via a regenerative relay. In this setup, a RIS is installed in each hop to inc...
Preprint
Full-text available
MIMO systems have shown to be effective in addressing today’s high demand for WC, particularly next generation (4G and 5G) mobile technologies, by combating the problem of fading and improving the quality and rate of wireless communications. MIMO-systems with space-time block codes (STBC) is a good choice to provide a complete variety with coherent...
Preprint
Full-text available
The importance of 30-day patients’ readmissions (PRs) to intensive unit care stems from the significant cost and mortality risk when the patient’s chosen class (i.e., readmitted or not to the hospital) is incorrect. The overall accuracy (OA) of the PRs classification obtained in the literature is still moderate, particularly for machine learning (M...
Preprint
Full-text available
The importance of 30-day patients’ readmissions (PRs) to intensive unit care stems from the significant cost and mortality risk when the patient’s chosen class (i.e., readmitted or not to the hospital) is incorrect. The overall accuracy (OA) of the PRs classification obtained in the literature is still moderate, particularly for machine learning (M...
Preprint
In this paper, the physical layer security of a dual-hop unmanned aerial vehicle-based wireless network, subject to imperfect channel state information (CSI) and mobility effects, is analyzed. Specifically, a source node $(S)$ communicates with a destination node $(D)$ through a decode-and-forward relay $(R)$, in the presence of two wiretappers $\l...
Article
In this paper, the performance analysis of simultaneous wireless information and power transfer (SWIPT) using time switching (TS) protocol-based amplify-and-forward (AF) dual-hop mixed radio-frequency/free-space optic (RF/FSO) coded and uncoded communication system (CC and UC) is investigated. Specifically, we look at using the One-Step Majority-Lo...
Article
Full-text available
Recently, air pollution has grown significantly, and it can frequently be challenging to identify the sources of contaminants. This article studies the deployment of multi-cooperative unmanned aerial vehicles (UAVs) to look for sources of pollution in an unknown region. Specifically, a probabilistic search strategy based on the Local Particle Swarm...
Article
This paper investigates the intercept probability (IP) performance for a dual-hop multi-secondary user (SU) underlay cognitive-radio networks. Whereby, the relay R is self-powered by harvesting energy from secondary sources using the time switching variant (TS) of simultaneous wireless information and power transfer (SWIPT) protocol. Single-antenna...
Article
In this article, the physical-layer security of a dual-hop unmanned aerial vehicle-based wireless network, subject to imperfect channel state information (CSI) and mobility effects, is analyzed. Specifically, a source node $(S)$ communicates with a destination node $(D)$ through a decode-and-forward relay $(R)$ , in the presence of two wireta...
Conference Paper
Full-text available
This paper investigates the performance of maximum-ratio combining (MRC) linear receivers in a massive multiple-input multiple-output (mMIMO) uplink communication system, that in terms of their signal-to-interference-plus-noise ratio (SINR) operating under independent flat Weibull multi-path fading channels (WFCs). Based on a tight approximate prob...
Preprint
Full-text available
div>Deep Neural Networks (DDNs) have achieved tremendous success in handling various Machine Learning (ML) tasks, such as speech recognition, Natural Language Processing, and image classification. However, they have shown vulnerability to well-designed inputs called adversarial examples. Researchers in industry and academia have proposed many adver...
Preprint
Full-text available
div>Deep Neural Networks (DDNs) have achieved tremendous success in handling various Machine Learning (ML) tasks, such as speech recognition, Natural Language Processing, and image classification. However, they have shown vulnerability to well-designed inputs called adversarial examples. Researchers in industry and academia have proposed many adver...
Article
Full-text available
The antenna's bandwidth is strongly dependent on its physical properties and the environment where it is located. Nevertheless, for transmitting devices embedded permanently in the soil, the propagation medium's properties are unstable due to dielectric permittivity's spatial and temporal changes. Relying on soil parameters values, we present three...
Article
Full-text available
This paper proposes an optimization strategy for searching moving targets’ locations using cooperative unmanned aerial vehicles (UAVs) in an unknown environment. Such a strategy aims at reducing the overall search time and impact of uncertainties caused by the motion of targets, as well as improving the detection efficiency of UAVs. Specifically, w...
Article
Full-text available
In this paper, the physical layer security of a multi-user jamming-assisted broadcast network in the presence of multiple eavesdroppers. Specifically, a base station (BS) is broadcasting data to multiple end-users via direct links in the presence of multiple passive wiretappers, while both the legitimate users and the eavesdroppers use a maximal-ra...
Article
We investigate the sum rate performance of a generalized space shift keying (GSSK)-aided, non-orthogonal multiple access (NOMA) network. In particular, we consider a multiple-input multiple-output (MIMO) NOMA downlink channel, where the base station employs GSSK modulation to transmit additional information to the NOMA users. We present a novel ene...
Preprint
Non-orthogonal multiple access (NOMA) is a technology enabler for the fifth generation and beyond networks, which has shown a great flexibility such that it can be readily integrated with other wireless technologies. In this paper, we investigate the interplay between NOMA and generalized space shift keying (GSSK) in a hybrid NOMA-GSSK (N-GSSK) net...
Article
Full-text available
In this work, we investigate the physical layer security of a jamming-based underlay cognitive satellite-terrestrial network consisting of a radio frequency link at the first hop and an optical feeder at the second hop. Particularly, one secondary user (SU) is transmitting data to an end-user optical ground station through the aid of a relay satell...
Article
In this letter, the impact of residual hardware impairment (RHI) on the performance of non-orthogonal multiple access (NOMA) is investigated by taking into account the effect of imperfect successive interference cancellation (ipSIC). The new exact and asymptotic pairwise error probability (PEP) expressions with RHI under ipSIC are derived over Rayl...
Preprint
Full-text available
Impairments baseband model in-phase and quadrature-phase Imbalance (IQI) and Residual hardware impairments (RHI) are two key factors degrading the performance of wireless communication systems (WCSs), particularly when high-frequency bands are employed, as in 5G systems and beyond. The impact of either IQI or RHI on the performance of various WCSs...
Article
Full-text available
Evaluating the sum of independent and not necessarily identically distributed (i.n.i.d) random variables (RVs) is essential to study different variables linked to various scientific fields, particularly, in wireless communication channels. However, it is difficult to evaluate the distribution of this sum when the number of RVs increases. Consequent...
Article
Full-text available
Large intelligent surface (LIS) has recently emerged as a potential enabling technology for 6G networks, offering extended coverage and enhanced energy and spectral efficiency. In this work, motivated by its promising potentials, we investigate the error rate performance of LIS-assisted non-orthogonal multiple access (NOMA) networks. Specifically,...
Article
Full-text available
This paper proposes new accurate approximations for average error probability (AEP) of a communication system employing either M-phase-shift keying (PSK) or differential quaternary PSK with Gray coding (GC-DQPSK) modulation schemes over generalized fading channel. Firstly, new accurate approximations of error probability (EP) of both modulation sch...
Article
Recently, the Fisher-Snedecor F distribution was proposed to model the turbulence in free-space optical (FSO) communications. However, the existing model does not consider pointing error impairment. To fill this gap, in this paper, we derive novel closed-form expressions for the probability density function (PDF) and cumulative distribution functio...
Article
Full-text available
Cognitive radio (CR) is a promising paradigm that comes to address the scarcity of the radio spectrum by providing opportunistic utilization of the underutilized licensed channels to attain higher spectrum efficiency. The efficient use of the vacant portion of the spectrum depends directly on the medium access control (MAC) layer that coordinates f...
Preprint
Machine Learning (ML), and Deep Learning (DL) in particular, play a vital role in providing smart services to the industry. These techniques however suffer from privacy and security concerns since data is collected from clients and then stored and processed at a central location. Federated Learning (FL), an architecture in which model parameters ar...
Article
Full-text available
The low efficiency of wireless power transfer (WPT) poses a key challenge for energy-constrained wireless networks. To address this issue, in this letter, the integration of intelligent reflecting surface (IRS) into a WPT network is investigated. To this end, an accurate approximation for the probability density function of the end-to-end cascaded...
Article
Full-text available
Machine Learning (ML), and Deep Learning (DL) in particular, play a vital role in providing smart services to the industry. These techniques however suffer from privacy and security concerns since data is collected from clients and then stored and processed at a central location. Federated Learning (FL), an architecture in which model parameters ar...
Article
Full-text available
Nowadays, the cybersecurity issue involves new strategies to protect against advanced threats and unknown attacks. Intrusion detection system (IDS) is considered a robust system dealing with attacks detection, particularly unknown attacks and anomalies. Several IDS-based algorithms have been recently inspected in the literature, among them the well...
Article
Full-text available
By considering the probability density function (PDF) of a generalized Gamma (GG) random variable (RV) evaluated in terms of a proper subset H^{1,0}_{1,1} class of Fox's H-function (FHF) and the moment-based approximation to estimate the H-function parameters, a closed-form tight approximate expression for the distribution of the sum of independent...
Article
Full-text available
This work investigates the performance of a dual-hop energy harvesting-based fixed-gain amplify-and-forward relaying communication system, subject to fading impairments. We consider a source node (S) communicating with a destination node (D), either directly or through a fixed distant relay (R), which harvests energy from its received signals and u...
Conference Paper
Full-text available
Hybrid terrestrial-satellite transmission systems have been among hottest spots in the wireless communication industry due to the high demand for global high data rates. In such systems, free-space optical (FSO) technology is advocated for assessing the feeder links (ground-satellite) in order to fulfill high data rates requirements and provide a l...
Preprint
Full-text available
In this work, we investigate the physical layer security of a jamming-based underlay cognitive hybrid satellite-terrestrial network {consisting of a} radio frequency link at the first hop and an optical feeder at the second hop. Particularly, one secondary user (SU) is transmitting data {to an end-user} optical ground station {($\boldsymbol{D}$)} t...
Article
Full-text available
In this paper, a very accurate approximation method for the statistics of the sum of Málaga-M random variates with pointing error (MRVs) is proposed. In particular, the probability density function of MRV is approximated by a Fox's H-function through the moment-based approach. Then, the respective moment-generating function of the sum of N MRVs is...
Conference Paper
Full-text available
This paper inspects the error rate and the capacity performance of a dual-hop energy harvesting (EH)-based fixed-gain amplify-and-forward relaying communication system, subject to fading impairments. We consider a source node (S) communicating with a destination node (D) via a relay node (R) equipped with a finite-size battery, which harvests energ...
Conference Paper
Full-text available
The wireless communication services are in great demand nowadays, especially in 5G mobile technologies and beyond. In this frame, multiple-input multiple-output (MIMO) systems have shown a good efficiency by combating the phenomenon of fading as well as enhancing the performance of wireless communication systems. Particularly, MIMO systems with spa...
Article
Full-text available
The Gaussian Q-function (GQF) and its integer powers are quite versatile in various fields of science. In most applications, it is involved in intractable integrals for which closed-form expressions cannot be evaluated. In this paper, six new bounds for the GQF are presented and their tightness and simplicity are discussed compared to existing ones...
Preprint
Full-text available
In this paper, a very accurate approximation method for the statistics of the sum of M\'{a}laga-$\mathcal{M}$ random variates with pointing error (MRVs) is proposed. In particular, the probability density function of MRV is approximated by a Fox's $H$-function through the moment-based approach. Then, the respective moment-generating function of the...
Preprint
Full-text available
Large intelligent surface (LIS) has recently emerged as a potential enabling technology for 6G networks, offering extended coverage and enhanced energy and spectral efficiency. In this work, motivated by its promising potentials, we investigate the error rate performance of LIS-assisted non-orthogonal multiple access (NOMA) networks. Specifically,...
Article
Full-text available
Hybrid terrestrial-satellite (HTS) communication systems have gained a tremendous amount of interest recently due to the high demand for global high data rates. Conventional satellite communications operate in the conventional Ku (12 GHz) and Ka (26.5-40 GHz) radio-frequency bands for assessing the feeder link, between the ground gateway and the sa...
Preprint
Full-text available
This paper proposes new accurate approximations for average symbol error probability (ASEP) of a communication system employing either M-phase-shift keying (PSK) or differential quaternary PSK (DQPSK) modulation schemes, with Gray coding over κ-μ shadowed fading channel. Firstly, new accurate approximations of symbol error probability (SEP) of both...
Preprint
Full-text available
In this paper, the performance of a dual-hop energy harvesting-based fixed-gain amplify-and-forward (AF) relaying communication system, subject to fading impairments, is investigated. We consider a source node ($S$) communicating with a destination node ($D$) through a fixed distant relay ($R$), which harvests energy from its received signals and u...
Preprint
Full-text available
Hybrid terrestrial-satellite (HTS) communication systems have gained a tremendous amount of interest recently due to the high demand for global high data rates. Conventional satellite communications operate in the conventional Ku (12 GHz) and Ka (26.5-40 GHz) radio-frequency bands for assessing the feeder link, between the ground gateway and the sa...
Article
Full-text available
In this paper, the physical layer security of a dual-hop underlay uplink cognitive radio network is investigated over Nakagami-m fading channels. Specifically, multiple secondary sources (Si)1≤i≤N are taking turns in accessing the licensed spectrum of the primary users and communicating with a multi-antenna secondary base station (D) through the ai...
Preprint
Full-text available
p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; font: 9.0px Helvetica} span.s1 {font: 7.5px Helvetica} xAbstract—In this paper, the physical layer security of a dualhop underlay uplink cognitive radio network is investigated over Nakagami-m fading channels. Specifically, multiple secondary sources are taking turns in accessing the licensed spectrum of...
Preprint
Full-text available
In this paper, the physical layer security of a dual-hop underlay uplink cognitive radio network is investigated over Nakagami-m fading channels. Specifically, multiple secondary sources are taking turns in accessing the licensed spectrum of the primary users and communicating with a multiantenna secondary base station D through the aid of a multia...
Article
Full-text available
Physical layer security is an important and timely topic in the research of future wireless systems and it constitutes a part of the Internet of Things (IoT) notion. IoT oriented systems are largely characterized by a stringent quality of service and enhanced security requirements, which comes at a cost of increased computational complexity that ne...
Conference Paper
The present contribution investigates the physical layer security in a cognitive radio network (CRN). To this end, we consider an underlay uplink CRN consisting of multiple secondary sources, a single-antenna secondary base station, and multiple eavesdroppers. In addition, we assume that the secondary sources transmit their data sequentially and th...
Conference Paper
Full-text available
The present contribution investigates the physical layer security in a cognitive radio network (CRN). To this end, we consider an underlay uplink CRN consisting of multiple secondary sources, a single-antenna secondary base station, and multiple eavesdroppers. In addition, we assume that the secondary sources transmit their data sequentially and th...
Conference Paper
We investigate the physical layer security of a relay-assisted underlay cognitive radio network with simultaneous wireless information and power transfer (SWIPT). To this end, we consider a secondary network comprising a secondary source S, one secondary user (SU) relay R, one SU destination D, one primary user (PU) transmitter, and one PU receiver...
Conference Paper
We investigate the physical layer security of a relay-assisted underlay cognitive radio network with simultaneous wireless information and power transfer (SWIPT). To this end, we consider a secondary network comprising a secondary source S, one secondary user (SU) relay R, one SU destination D, one primary user (PU) transmitter, and one PU receiver...