
Tarik Taleb- NEC Laboratories Europe
Tarik Taleb
- NEC Laboratories Europe
About
465
Publications
99,208
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
22,008
Citations
Introduction
Skills and Expertise
Current institution
Publications
Publications (465)
Mafia, or Werewolf, is a strategic game where two teams compete to eliminate each other’s players through deception and hidden roles. The game dynamics and role interactions share notable similarities with adversarial behaviors in network security, making it a valuable framework for modeling cyber threats, particularly botnet detection. In this pap...
The explosive growth of user devices and emerging applications is driving unprecedented traffic demands, accompanied by stringent Quality of Service (QoS) requirements. Addressing these challenges necessitates innovative service orchestration methods capable of seamless integration across the edge-cloud continuum. Terrestrial network-based service...
The Metaverse holds the potential to revolutionize digital interactions through the establishment of a highly dynamic and immersive virtual realm over wireless communications systems , offering services such as massive twinning and telepresence. This landscape presents novel challenges, particularly efficient management of multiple access to the fr...
The advancement towards 6G technology leverages improvements in aerial-terrestrial networking, where one of the critical challenges is the efficient allocation of transmit power. Although existing studies have shown commendable performance in addressing this challenge, a revolutionary breakthrough is anticipated to meet the demands and dynamism of...
The Metaverse holds the potential to revolutionize digital interactions through the establishment of a highly dynamic and immersive virtual realm over wireless communications systems, offering services such as massive twinning and telepresence. This landscape presents novel challenges, particularly efficient management of multiple access to the fre...
6G networks aim to achieve global coverage, massive connectivity, and ultra-stringent requirements. Space-Air-Ground Integrated Networks (SAGINs) and Semantic Communication (SemCom) are essential for realizing these goals, yet they introduce considerable complexity in resource orchestration. Drawing inspiration from research in robotics, a viable s...
This paper investigates covert communications in a multi-relay Internet of Things (IoT) system with multiple energy harvesting jammers, where a transmitter (Alice) attempts to covertly transmit confidential messages to its destination (Bob) through relay forwarding, while a warden (Willie) detects the existence of Alice’s transmission. Specifically...
Warden collusion represents a hazardous threat to wireless covert communication, where wardens can combine their observations to perform a more aggressive detection attack. This paper investigates the impact of warden collusion on covert communication in a multi-antenna wireless network consisting of one source, one destination, multiple wardens an...
Delivering time-sensitive (TS) information deterministically is vital for safety-related critical applications like vehicular networks. This letter presents a latency model for the TS packet delivery from the edge server to the vehicle. The Network-Controlled Repeater (NCR) is used to assist the packet delivery over random wireless channels where t...
The main goal of Encryption as a Service (EaaS) is to deliver cryptography services to limited-resource devices. However, due to the massive number of devices connecting EaaS platforms, they face challenging issues, such as high service delays and uncovered requests. The existing EaaS architectures lack adequate taking advantage of both cloud and f...
In the context of advancing 6G, a substantial paradigm shift is anticipated, highlighting comprehensive everything-to-everything interactions characterized by numerous connections and stringent adherence to Quality of Ser-vice/Experience (QoS/E) prerequisites. The imminent challenge stems from resource scarcity, prompting a deliberate transition to...
Network slices are generally coupled with services and face service continuity/unavailability concerns due to the high mobility and dynamic requests from users. Network slice mobility (NSM), which considers user mobility, service migration, and resource allocation from a holistic view, is witnessed as a key technology in enabling network slices to...
Mobile crowdsensing (MCS) has emerged as a popular and promising paradigm for solving challenging problems by utilizing collective wisdom and resources. However, the system architecture and operational rules for MCS have not been well-defined, and obtaining accurate and reliable results from conflicting data collected by workers is difficult due to...
The popularity of microservices in industry has sparked much attention in the research community. Despite significant progress in microservice deployment for resource-intensive services and applications at the network edge, the intricate dependencies among microservices are often overlooked, and some studies underestimate the importance of system c...
This paper investigates sum-rate maximization while achieving seamless coverage with the minimum number of UAVs in a device-to-device (D2D)-enabled unmanned aerial vehicle (UAV) network. Toward this end, we formulate it as a nonlinear and nonconvex optimization problem, and then propose a Max-Rate Min-Number (MRMN) scheme to solve this optimization...
The evolution of wireless communication systems will be fundamentally impacted by an open radio access network (O-RAN), a new concept defining an intelligent architecture with enhanced flexibility, openness, and the ability to slice services more efficiently. For all its promises, and like any technological advancement, O-RAN is not without risks t...
The effective distribution of user transmit powers is essential for the significant advancements that the emergence of 6G wireless networks brings. In recent studies, Deep Neural Networks (DNNs) have been employed to address this challenge. However, these methods frequently encounter issues regarding fairness and computational inefficiency when mak...
The effective distribution of user transmit powers is essential for the significant advancements that the emergence of 6G wireless networks brings. In recent studies, Deep Neural Networks (DNNs) have been employed to address this challenge. However, these methods frequently encounter issues regarding fairness and computational inefficiency when mak...
Benefiting from the booming of Big Data and artificial intelligence (AI) technologies, data-as-a-service is gradually transforming into knowledge-as-a-service. Extracting knowledge from massive raw data is becoming a popular paradigm to save network resources and improve efficiency, and establishing knowledge markets is receiving increasing attenti...
This paper investigates a wireless powered mobile edge computing (WP-MEC) network with multiple hybrid access points (HAPs) in a dynamic environment, where wireless devices (WDs) harvest energy from radio frequency (RF) signals of HAPs, and then compute their computation data locally (i.e., local computing mode) or offload it to the chosen HAPs (i....
The integration of communication and radar systems could enhance the robustness of future communication systems to support advanced application demands, e.g., target sensing, data exchange, and parallel computation. In this paper, we investigate the beamforming design for Integrated Sensing, Computing, and Communication (ISCC) in the Internet of Ro...
This paper investigates the fundamental covert rate performance in a D2D-enabled cellular network consisting of a cellular user Alice, a base station BS, an active warden Willie, and a D2D pair with a transmitter
$D_{t}$
and a full-duplex receiver
$D_{r}$
. To conduct covert communication between Alice and BS, the full-duplex
$D_{r}$
transmit...
Network function virtualization leverages programmable data plane switches to deploy in-network implementable functions, to improve QoS. The memories of switches can be extended through remote direct memory access to access external memories. This paper exploits the switches external memories to place VNFs at time intervals with ultra-low latency a...
Federated Learning (FL) enables training of a global model from distributed data, while preserving data privacy. However, the singular-model based operation of FL is open with uploading poisoned models compatible with the global model structure and can be exploited as a vulnerability to conduct model poisoning attacks. This paper proposes a multi-m...
Industrial Internet of Things (IIoT) is highly sensitive to data privacy and cybersecurity threats. Federated Learning (FL) has emerged as a solution for preserving privacy, enabling private data to remain on local IIoT clients while cooperatively training models to detect network anomalies. However, both synchronous and asynchronous FL architectur...
Offering intelligent services with ultra low latency and high reliability is one of the main objectives of 6G networks. Federated Learning (FL) is a solution to enhance the security of data and the accuracy, in comparison with local training of data in devices. The transmission cost in conventional FL is high. Performing FL using edge infrastructur...
The advent of 6G networks will present a pivotal juncture in the evolution of telecommunications, marked by the proliferation of devices, dynamic service requests, and the integration of edge and cloud computing. In response to these transformative shifts, this paper proposes a service and resource discovery architecture as part of service provisio...
The advent of 6G networks will present a pivotal juncture in the evolution of telecommunications, marked by the proliferation of devices, dynamic service requests, and the integration of edge and cloud computing. In response to these transformative shifts, this paper proposes a service and resource discovery architecture as part of service provisio...
In the context of emerging 6G services, the realization of everything-to-everything interactions involving a myriad of physical and digital entities presents a crucial challenge. This challenge is exacerbated by resource scarcity in communication infrastructures, necessitating innovative solutions for effective service implementation. Exploring the...
Edge computing has promoted various applications driven by artificial intelligence (AI). However, upgrading AI models during system operation may change resource and performance features. Then, the service management controller (SMC) faces an unprecedented environmental condition and has limited prior knowledge, resulting in high probabilities of p...
Edge cloud technologies working in conjunction with AI-powered solutions can help surmount the challenges associated with the distributed execution of immersive services and contribute to delivering a positive end-user experience. Intelligent resource management, orchestration, and predictive systems can enhance service deployment, adapt to changin...
Edge servers can collaborate to enhance service capability. However, cloud servers may be unable to execute centralized management due to unpredictable communications. In such systems, distributed task and resource management are vital but challenging due to heterogeneity and various restrictions. Therefore, this paper studies such edge systems and...
Anticipation for 6G's arrival comes with growing concerns about increased energy consumption in computing and networking. The expected surge in connected devices and resource-demanding applications presents unprecedented challenges for energy resources. While sustainable resource allocation strategies have been discussed in the past, these efforts...
The emergence of the semantic-aware paradigm presents opportunities for innovative services, especially in the context of 6G-based applications. Although significant progress has been made in semantic extraction techniques, the incorporation of semantic information into resource allocation decision-making is still in its early stages, lacking consi...
To address the evolving landscape of next-generation mobile networks, characterized by an increasing number of connected users, surging traffic demands, and the continuous emergence of new services, a novel communication paradigm is essential. One promising candidate is the integration of network slicing and in-network computing, offering resource...
Extended Reality (XR) refers to a class of contemporary services that are intertwined with a plethora of rather demanding Quality of Service (QoS) and functional requirements. Despite Kubernetes being the de facto standard in terms of deploying and managing contemporary containerized microservices, it lacks adequate support for cross-cluster networ...
This paper investigates the long-term average age of information (AoI)-minimal problem in an unmanned aerial vehicle (UAV)-assisted wireless-powered communication network (WPCN), which consists of a static hybrid access point (HAP), a mobile UAV, and many static sensor nodes (SNs) randomly distributed on multiple islands. The UAV first is fully cha...
Wireless edge networks can provide edge services to support various time-critical Internet of Things (IoT) applications, like autonomous vehicles, where cache content updates are significant to maintaining information freshness quantified as information of age (AoI). However, frequent content updates result in high energy consumption at the edge no...
Distributed Vehicle Sharing System (DVSS) leverages emerging technologies such as blockchain to create a secure, transparent, and efficient platform for sharing vehicles. In such a system, both efficient matching of users with available vehicles and optimal pricing mechanisms play crucial roles in maximizing system revenue. However, most existing s...
In vehicular edge computing networks (VECNs), service migration among edge servers is critical to address the challenge of service interruption caused by high mobility of vehicles and limited coverage of each edge server. In this paper, we tackle this challenge by optimizing service migration among edge servers through a joint management of resourc...
Robotic teleoperation has seen widespread adoption across industries. Advances in technologies like the Internet of Things (IoT), Artificial Intelligence (AI), and Extended Reality (XR) are making teleoperation more flexible. The integration of visual, audio, tactile, and immersive interfaces enhances situational awareness, enabling teleoperators t...
This paper investigates a wireless powered mobile edge computing (WP-MEC) network with multiple hybrid access points (HAPs) in a dynamic environment, where wireless devices (WDs) harvest energy from radio frequency (RF) signals of HAPs, and then compute their computation data locally (i.e., local computing mode) or offload it to the chosen HAPs (i....
As vehicle technologies rapidly advance, video streaming capabilities emerge as a significant feature of modern on-board vehicular systems. The integration of 360
$^{\circ }$
video streaming in vehicles is expected to enhance road situational awareness, by providing panoramic live streaming and recording capabilities. This paper introduces the con...
With the advancements in AI-generated content (AIGC) technologies and edge cloud networks, the demand for AIGC services is increasing. The diffusion model stands out for its ability to generate images from text. However, its high computational requirements challenge user devices, leading to ongoing efforts to improve inferring speed while preservin...
In the context of advancing 6G, a substantial paradigm shift is anticipated, highlighting comprehensive everything-to-everything interactions characterized by numerous connections and stringent adherence to Quality of Service/Experience (QoS/E) prerequisites. The imminent challenge stems from resource scarcity, prompting a deliberate transition to...
Cloud-native services face unique cybersecurity challenges due to their distributed infrastructure. They are susceptible to various threats like malware, DDoS attacks, and Man-in-the-Middle (MITM) attacks. Additionally, these services often process sensitive data that must be protected from unauthorized access. On top of that, the dynamic and scala...
Artificial IntelligenceandMachineLearning (AI/ML) cantransformmobilecommunications,enablenew applications andservices,andpavethewaybeyond5G.The adoption ofAI/MLmayalsoadvancenetworkoptimizations and servicelife-cyclemanagement.Thisarticleprovidesan overviewofAI/MLanalyticsexploringthemainconceptsin relationtonetworkautomationandservice-basedarchite...
Network slicing in 5G networks can be modeled as a Virtual Network Embedding (VNE) problem, wherein the slice requests must be efficiently mapped on the core network. This process faces two major challenges: covering the maximum number of requests and providing slice isolation. Slice isolation is a mechanism for protecting the slices against Distri...
Device-to-device (D2D) communications underlaid cellular networks have emerged as a promising network architecture to provide extended coverage and high data rate for various Internet of Things (IoT) applications. However, because of the inherent openness and broadcasting nature of wireless communications, such networks face severe risks of data pr...
Multi-services are of fundamental importance in Unmanned Aerial Vehicle (UAV)-enabled aerial communications for the Internet of Things (IoT). However, the multi-services are challenging in terms of requirements and use of shared resources such that the traditional solutions for a single service are unsuitable for the multi-services. In this paper,...
Metaverse is the concept of a fully immersive and universal virtual space for multiuser interaction, collaboration, and socializing; forming the next evolution of the Internet. Metaverse depends on the convergence of multiple broad technologies that enable eXtended Reality (XR), which is an umbrella term for technologies that lie on the reality-vir...
In the era of big data, the unprecedented growth of data has been regarded as an important asset and the commercial application of data acquisition markets has emerged accordingly. With the advancement of vehicle manufacturing and sensor technologies, a large amount of data can be collected and stored in electric vehicles (EV), making the data acqu...
In optical networks, failure localization is essential to stable operation and service restoration. Several approaches have been presented to achieve accurate failure localization of nodes and inter-nodes. However, due to increasing traffic and demand for flexibility, the reconfigurable optical add/drop multiplexer (ROADM) is evolving towards a mul...
This paper investigates the covert communications via cooperative jamming and relay selection in a wireless relay system, where a source intends to transmit a message to its destination with the help of a selected relay, and a warden attempts to detect the existence of wireless transmissions from both the source and relay, while friendly jammers se...
3GPP specified 5G and provided improvements in terms of the system performance and support for the integration of new scenarios for accommodating various vertical segments. The upcoming Release 18 defines “5G Advanced” as a milestone towards 6G, introducing several enhancements in terms of the network architecture, physical layer, new services, sec...
Driven by the emerging mission-critical applications, the need for the deterministic networking (DetNet) capabilities of the current network infrastructure is becoming increasingly important, and that is to enable assured bandwidth, latency/jitter and reliability for these services. Recently, the technological advancements of non-terrestrial networ...
This paper explores a new secure wireless communication scenario for the data collection in the Internet of Things (IoT) where the physical layer security technology is applied to counteract both the detection and eavesdropping attacks, such that the critical covertness and secrecy properties of the communication are jointly guaranteed. We first pr...
Nowadays, as the need for capacity continues to grow, entirely novel services are emerging. A solid cloud-network integrated infrastructure is necessary to supply these services in a real-time responsive, and scalable way. Due to their diverse characteristics and limited capacity, communication and computing resources must be collaboratively manage...
Network slicing is envisaged as the key to unlocking revenue growth in 5 G and beyond (B5G) networks. However, the dynamic nature of network slicing and the growing sophistication of DDoS attacks rises the menace of reshaping a stealthy DDoS into an Economical Denial of Sustainability (EDoS) attack. EDoS aims at incurring economic damages to servic...
This paper investigates the covert communications via cooperative jamming and relay selection in a wireless relay system, where a source intends to transmit a message to its destination with the help of a selected relay, and a warden attempts to detect the existence of wireless transmissions from both the source and relay, while friendly jammers se...
The Quantum Internet (QI) is a hypothetical global network infrastructure that exploits quantum mechanics principles to distribute qubits worldwide. The QI will enable breakthrough applications like unconditional security, distributed quantum computing, and quantum metrology. Nonetheless, the QI is currently a research-stage technology with dauntin...
Multiaccess edge computing (MEC) provides services for resource-sensitive and delay-sensitive Internet of Things (IoT) applications by extending the capabilities of cloud computing to the edge of the networks. However, the high mobility of IoT devices (e.g., vehicles) and the limited resources of edge servers (ESs) affect the service continuity and...
Advancements in deep learning and the Internet of Things (IoT) enable early fire detection through vision-based systems, reducing ecological, social, and economic damage. These systems necessitate lightweight, cost-effective convolutional neural networks (CNNs) for real-time operation. Effective deployment on AI-assisted edge devices is crucial for...
The widespread adoption of Internet of Things (IoT) technology has introduced new cybersecurity challenges. Encryption services are being offloaded to cloud and fog platforms to mitigate these risks. Encryption as a Service (EaaS) emerges as a remedy, offering cryptographic solutions tailored to the resource constraints of IoT devices. This study t...
Unmanned Aerial Vehicles (UAVs) are an emerging technology in the 5G and beyond systems with the promise of assisting cellular communications and supporting IoT deployment in remote and density areas. Safe and secure navigation is essential for UAV remote and autonomous deployment. Indeed, the open-source simulator can use commercial software-defin...
Even a wider set of highly critical and latency-sensitive applications with resource needs from the access network and the edge will be supported by the 6G networks. Therefore, the 6G network will deal with diversification of service platforms. Optimizing the resource consumption of network slicing on top of a shared infrastructure will become esse...
With the evolution of 5G networks, the demand for Ultra-Reliable Low Latency Communications (URLLC) services is increasing. Software-Defined Networking (SDN) offers flexible network management to prioritize URLLC services coexisting with best-effort traffic. Utilizing the network programmability feature of SDN, Software-Defined Queueing (SDQ) frame...
The vital importance of securing 5G and beyond networks while meeting their stringent performance requirements has promoted the recent shift towards fully automated and smart security management. In this paper, we introduce a novel autonomic and cognitive security management framework that empowers fine-grained zero-touch security management throug...