Saeed Reza Khosravirad

Saeed Reza Khosravirad
  • PhD
  • Senior Researcher at Nokia Bell Labs

About

58
Publications
8,845
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,001
Citations
Current institution
Nokia Bell Labs
Current position
  • Senior Researcher
Additional affiliations
January 2015 - November 2016
Nokia Bell Labs
Position
  • Engineer
August 2015 - present
Alcatel Lucent
Position
  • Radio Research Engineer
September 2010 - March 2015
McGill University
Position
  • Research Assistant - PhD Candidate

Publications

Publications (58)
Preprint
Full-text available
Remote state estimation of large-scale distributed dynamic processes plays an important role in Industry 4.0 applications. In this paper, we focus on the transmission scheduling problem of a remote estimation system. First, we derive some structural properties of the optimal sensor scheduling policy over fading channels. Then, building on these the...
Article
This paper addresses the problem of minimising latency in computation offloading with digital twin (DT) wire-less edge networks for industrial Internet-of-Things (IoT) environment via ultra-reliable and low latency communications (URLLC) links. The considered DT-aided edge networks provide a powerful computing framework to enable computation-intens...
Article
Hybrid automatic repeat request (HARQ) is a key enabler for ultrareliable communications. This paper optimizes transmit power for the initial transmission and the subsequent retransmissions of HARQ with either incremental redundancy or Chase combining, aiming to minimize the expected energy consumption given the target outage probability and the ta...
Article
In this letter, we propose a novel digital twin scheme supported metaverse by jointly considering the integrated model of communications, computing, and storage through the employment of mobile edge computing (MEC) and ultra-reliable and low latency communications (URLLC). The MEC-based URLLC digital twin architecture is proposed to provide powerfu...
Preprint
Full-text available
The narrowband and far-field assumption in conventional wireless system design leads to a mismatch with the optimal beamforming required for wideband and near-field systems. This discrepancy is exacerbated for larger apertures and bandwidths. To characterize the behavior of near-field and wideband systems, we derive the beamforming gain expression...
Conference Paper
We study a joint communication and computation offloading (JCCO) for hierarchical edge-cloud systems with ultra-reliable and low latency communications (URLLC). We aim to minimize the worst-case end-to-end (e2e) latency of computational tasks among multiple industrial Internet of Things (IIoT) devices by jointly optimizing offloading probabilities,...
Preprint
Hybrid automatic repeat 1 request (HARQ) is a key enabler for ultrareliable communications. This paper optimizes transmit power for the initial transmission and the subsequent retransmissions of HARQ with either incremental redundancy or Chase combining, aiming to minimize the expected energy consumption given the target outage probability and the...
Article
Industrial wireless control systems are mainly designed on the premise of time-sensitive ultra-reliable low-latency communications (URLLC). With the introduction of survival time to the quality of service requirements of such systems, the design paradigm has evolved from typical link reliability (i.e., minimizing packet error rate), to service avai...
Article
Full-text available
The next wave of wireless technologies is proliferating in connecting things among themselves as well as to humans. In the era of the Internet of things (IoT), billions of sensors, machines, vehicles, drones, and robots will be connected, making the world around us smarter. The IoT will encompass devices that must wirelessly communicate a diverse s...
Preprint
Full-text available
In the framework of 5G-and-beyond Industry 4.0, jamming attacks for denial of service are a rising threat which can severely compromise the system performance. Therefore, in this paper we deal with the problem of jamming detection and mitigation in indoor factory deployments. We design two jamming detectors based on pseudo-random blanking of subcar...
Article
Full-text available
The next wave of wireless technologies is proliferating in connecting things among themselves as well as to humans. In the era of the Internet of Things (IoT), billions of sensors, machines, vehicles, drones, and robots will be connected, making the world around us smarter. The IoT will encompass devices that must wirelessly communicate a diverse s...
Article
In this paper, we study joint communication and computation offloading (JCCO) for hierarchical edge-cloud systems with ultra-reliable and low latency communications (URLLC). We aim to minimize the end-to-end (e2e) latency of computational tasks among multiple industrial Internet of Things (IIoT) devices by jointly optimizing offloading probabilitie...
Article
In this paper, we propose reconfigurable intelligent surface (RIS)-assisted unmanned aerial vehicles (UAVs) networks that can utilise both advantages of UAV's agility and RIS's reflection for enhancing the network's performance. To aim at maximising the energy efficiency (EE) of the considered networks, we jointly optimise the power allocation of t...
Article
Full-text available
The 6th Generation (6G) radio access technology is expected to support extreme communication requirements in terms of throughput, latency and reliability, which can only be achieved by providing capillary wireless coverage. In this paper, we present our vision for short-range low power 6G ‘in-X’ subnetworks, with the ‘X’ standing for the entity in...
Article
Full-text available
Ultra-reliable low-latency communications (URLLCs) and the adoption of unmanned aerial vehicles (UAVs) for network coverage improvement have emerged as key enabling communication paradigms for the successful deployment of mobile communication services envisioned in both the fifth-generation (5G) and the sixth-generation (6G) networks. This paper pr...
Article
We study an industry automation scenario where a central controller broadcasts critical messages to the wireless devices (e.g., sensors/actuators). We devise a stochastic geometry framework where the rate coverage probability of devices is modeled by taking into account the density of roaming blockages over the factory floor. To alleviate the loss...
Article
Future wireless cellular networks are envisioned to not only enhance broadband access for human-centric applications, but also offer massive connectivity across tens of billions of devices for machine-centric applications empowered by Internet of Things (IoT) technologies (e.g., smart factory and smart city). To embrace the forthcoming era of IoT,...
Preprint
Full-text available
The next wave of wireless technologies is proliferating in connecting things among themselves as well as to humans. In the era of the Internet of things (IoT), billions of sensors, machines, vehicles, drones, and robots will be connected, making the world around us smarter. The IoT will encompass devices that must wirelessly communicate a diverse s...
Article
Full-text available
Factory automation is one of the use cases for 5G-and-beyond mobile networks where strict requirements in terms of latency, availability and reliability are required. In this paper, we investigate the potentials of massive MIMO in delivering those promises for industrial automation. Namely, communications between actuators (ACs) and Access Points (...
Preprint
Full-text available
Security attacks at the physical layer, in the form of radio jamming for denial of service, are an increasing threat in the Industry 4.0 scenarios. In this paper, we consider the problem of jamming detection in 5G-and-beyond communication systems and propose a defense mechanism based on pseudo-random blanking of subcarriers with orthogonal frequenc...
Article
In this work, we consider a joint optimisation of real-time deployment and resource allocation scheme for UAV-aided relay systems in emergency scenarios such as disaster relief and public safety missions. In particular, to recover the network within a disaster area, we propose a fast K-means-based user clustering model and jointly optimal power and...
Preprint
Full-text available
In this paper, we propose intelligent reconfigurable surface (IRS)-assisted unmanned aerial vehicles (UAVs) networks that can utilise both advantages of agility and reflection for enhancing the network's performance. To aim at maximising the energy efficiency (EE) of the considered networks, we jointly optimise the power allocation of the UAVs and...
Article
This paper introduces a wireless communication protocol for industrial control systems that uses channel quality awareness to dynamically create network-device cooperation and assist the nodes in momentary poor channel conditions. To that point, channel state information is used to identify nodes with strong and weak channel conditions. We show tha...
Preprint
Full-text available
This paper introduces a wireless communication protocol for industrial control systems that uses channel quality awareness to dynamically create network-device cooperation and assist the nodes in momentary poor channel conditions. To that point, channel state information is used to identify nodes with strong and weak channel conditions. We show tha...
Article
This paper proposes interference mitigation techniques for provisioning ultrareliable low-latency wireless communication in an industrial automation setting, where multiple transmissions from controllers to actuators interfere with each other. Channel fading and interference are key impairments in wireless communication. This paper leverages the re...
Article
We consider a downlink periodic wireless communications system where multiple access points (APs) cooperatively transmit packets to a number of devices, e.g. actuators in an industrial control system. Each period consists of two phases: an uplink training phase and a downlink data transmission phase. Each actuator must successfully receive its uniq...
Preprint
Full-text available
(Latest version at https://arxiv.org/abs/1806.09387) We consider a downlink periodic wireless communications system where multiple access points (APs) cooperatively transmit packets to a number of devices, e.g. actuators in an industrial control system. Each period consists of two phases: an uplink training phase and a downlink data transmission p...
Article
Full-text available
The future wireless networks envision ultra-reliable communication with efficient use of the limited wireless channel resources. Closed-loop repetition protocols where retransmission of a packet is enabled using a feedback channel has been adopted since early days of wireless telecommunication. Protocols such as automatic repeat request (ARQ) are u...
Article
Current mobile communications systems have a rather simple and single-mode HARQ functionality that is applied for all services. In this article we argue for having a set of user-centric HARQ enhancements that are configurable in coherence with its service requirements, as a means to more efficiently optimize the end-to-end performance. A set of HAR...
Article
Full-text available
We analyze the opportunistic relaying based on HARQ transmission over the block-fading channel with absence of channel state information (CSI) at the transmitter nodes. We assume that both the source and the relay are allowed to vary their transmission rate between the HARQ transmission rounds. We solve the problem of throughput maximization with r...
Article
Full-text available
We analyze the average throughput and the outage probability for relay-based incremental redundancy HARQ transmission over block fading channel. We focus on the effects of having an error-free multi-bit feedback channel instead of the single-bit ACK/NACK feedback used in conventional HARQ. This multi-bit feedback message provides the cooperating no...
Conference Paper
We analyze HARQ transmission over a fading channel with the help of a relay node. In the absence of the channel state information (CSI) at the transmitters, we establish the problem of maximizing the overall throughput of HARQ transmission by optimizing the variable transmission rate. We present a closed form of the throughput with respect to the t...
Article
Full-text available
This paper considers incremental redundancy hybrid ARQ (HARQ) transmission over independent block-fading channels. The transmitter, having no knowledge of the instantaneous channel state information (CSI) can or - allocate the transmission rate knowing the statistics of the channel, or - adapt the transmissions rates using the outdated CSI, i.e., t...
Conference Paper
In this paper we analyze the maximum achievable throughput of Hybrid ARQ (HARQ) protocol for transmission over cooperative block-fading channels. It is assumed that the instantaneous channel state information (CSI) is not available at the encoders and only its outdated version is available via the error-free feedback channel. The outdated CSI is th...
Article
Full-text available
The Least Significant Bit (LSB) substitution is an old and simple data hiding method that could almost effortlessly be implemented in spatial or transform domain over any digital media. This method can be attacked by several steganalysis methods, because it detectably changes statistical and perceptual characteristics of the cover signal. A typical...
Article
This study introduces a new scheme for steganalysis of the least significant bit (LSB) embedding, based on the idea of closure of sets (CoS), which is independent of the type of cover signal, applicable to both spatial and transform domains. The CoS is referred to as some special subsets that could be found in a common space whose elements relate t...
Conference Paper
This paper presents a new scheme for steganalysis of random LSB embedding, capable of applying to any kind of digital signal in both spatial and transform domains. The proposed scheme is based on defining a space whose elements relate to higher-order statistical properties of the signal and looking for special subsets, which we call closure of sets...

Network

Cited By