Abbas Jamalipour's research while affiliated with The University of Sydney and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (579)
p>The rapid development of Artificial Intelligence-Generated Content (AIGC) has brought daunting challenges regarding service latency, security, and trustworthiness. Recently, researchers presented the edge AIGC paradigm, effectively optimize the service latency by distributing AIGC services to edge devices. However, AIGC products are still unprote...
p>The rapid development of Artificial Intelligence-Generated Content (AIGC) has brought daunting challenges regarding service latency, security, and trustworthiness. Recently, researchers presented the edge AIGC paradigm, effectively optimize the service latency by distributing AIGC services to edge devices. However, AIGC products are still unprote...
This paper puts forth a new, reconfigurable intelligent surface (RIS)-assisted, uplink, user-centric cell-free (UCCF) system managed with the assistance of a digital twin (DT). Specifically, we propose a novel learning framework that maximizes the sum-rate by jointly optimizing the access point and user association (AUA), power control, and RIS bea...
This paper presents a new deep reinforcement learning (DRL)-based approach to the trajectory planning and jamming rejection of an unmanned aerial vehicle (UAV) for the Internet-of-Things (IoT) applications. Jamming can prevent timely delivery of sensing data and reception of operation instructions. With the assistance of a reconfigurable intelligen...
Rate Splitting Multiple Access (RSMA) has recently emerged as a promising technique to enhance the transmission rate for multiple access networks. Unlike conventional multiple access schemes, RSMA requires splitting and transmitting messages at different rates. The joint optimization of the power allocation and rate control at the transmitter is ch...
Sybil attack refers to the situation when a malicious node falsely claims to have numerous identities and is known to be one of the security threats to the Internet of Things (IoT). Due to recent increase usage of unmanned aerial vehicles (UAVs) in various applications, Sybil attack has been identified as a threat to the flying ad hoc network (FANE...
Industrial Internet-of-Things (IIoT) applications generate data in varying amounts with diverse quality of service requirements. The adaptive network access approach and distributed resource management in IIoT networks can reduce the communication overheads caused by centralized resource management approaches. In this regard, statistical learning i...
In this paper, we propose ENergy-efficient disastER manaGmENT (ENERGENT) as a novel framework for disaster management in the unmanned aerial vehicle (UAV)-assisted Fog-Internet of things (IoT) networks. ENERGENT optimizes the energy consumption of the terminal nodes (TNs), as well as the UAVs, using three proposed algorithms. The first algorithm op...
This paper studies a communication-centric integrated sensing and communication (ISAC) system, where a multi-antenna base station (BS) simultaneously performs downlink communication and target detection. A novel target detection and information transmission protocol is proposed, where the BS executes the channel estimation and beamforming successiv...
This article puts forth an aerial edge Internet of Things (EdgeIoT) system, where an unmanned aerial vehicle (UAV) is employed as a mobile-edge server to process mission-critical computation tasks of ground Internet of Things (IoT) devices. When the UAV schedules an IoT device to offload its computation task, the tasks buffered at the other unselec...
With the full development of intelligent mobile communications, wireless mixed reality (MR) provides a more visually immersive experience and stronger interaction with environments than virtual reality (VR) and augmented reality (AR). However, the asymmetric characteristic of wireless MR traffic creates a huge challenge to current mobile networks....
In the sixth-generation (6G) cellular networks, hybrid beamforming would be a real-time optimization problem that is becoming progressively more challenging. Although numerical computation-based iterative methods such as the minimal mean square error (MMSE) and the alternative manifold-optimization (Alt-Min) can already attain near-optimal performa...
This paper investigates the computation offloading problem in a high mobility internet of vehicles (IoVs) environment, aiming to guarantee latency, energy consumption, and payment cost requirements. Both moving and parked vehicles are utilized as fog nodes. Vehicles in high mobility environments need collaborative interactions in a decentralized ma...
Application demand for faster data rates is driving the need for wider operating bandwidth of future 5G/6G communication systems which in turn poses stringent requirements on the design of suitable antennas. A candidate antenna that can support 5G/6G systems are reflectarrays (RAs) due to their numerous potentials, such as high gain, beam shaping,...
Dynamic topology, fast-changing channels and the time sensitivity of safety-related services present challenges to the status quo of resource allocation for cellular-underlaying vehicle-to-vehicle (V2V) communications. In this paper, we investigate a novel federated multi-agent deep reinforcement learning (FedMARL) approach for the decentralized jo...
Until now, multi-hop device-to-device (MD2D) routing in mobile wireless networks has been designed to operate over a single-protocol routing framework. Consequently, to the best of our knowledge, no framework has been developed to enable the dynamic deployment and switching of multiple MD2D routing protocols under one framework. This paper proposes...
The next generation of wireless systems will take the concept of communications and networking to another level through the seamless integration of terrestrial, aerial, satellite, maritime and underwater communication systems. Reconfigurable intelligent surface (RIS) is an innovative technology which, with its singular features and functionalities,...
Vehicular networks are envisioned to deliver data transmission services ubiquitously, especially in the upcoming autonomous driving era. Accordingly, the high data traffic load poses a heavy burden to the terrestrial network infrastructure. Unmanned Aerial Vehicles (UAVs) show enormous potential to assist vehicular networks in providing services. I...
p>We focus on the secure performance metrics at the legitimate users, i.e. secure outage probability (SOP) and secrecy capacity, to quantify the secrecy performance of NOMA-RIS-aided IoT systems. We assume the RIS is placed between the access point and the legitimate devices, and is expected to enhance the link security through the smart phase shif...
p>We focus on the secure performance metrics at the legitimate users, i.e. secure outage probability (SOP) and secrecy capacity, to quantify the secrecy performance of NOMA-RIS-aided IoT systems. We assume the RIS is placed between the access point and the legitimate devices, and is expected to enhance the link security through the smart phase shif...
As the heterogeneous service requirements in vehicular networks (VNs) increase, caching, computing, and communication (3C) resources should be dynamically allocated. Unlike a traditional cellular wireless network with a fixed topology among base stations (BSs), unmanned aerial vehicles (UAVs) can constitute an energy-efficient rearrangeable wireles...
Cyber-attacks are getting increasingly complex, and as a result, the functional concerns of intrusion-detection systems (IDSs) are becoming increasingly difficult to resolve. The credibility of security services, such as privacy preservation, authenticity, and accessibility, may be jeopardized if breaches are not detected. Different organizations c...
In this paper, a new game-theoretic multi-layer computing resource and network resource allocation algorithm is proposed for computation offloading in Multi-access Edge Computing (MEC) networks. We establish a new multi-layer system model for Data Center Operators and develop resource allocation relation between the MEC data center operators and us...
Mission-critical Internet-of-Things (IoT) applications require communication interfaces that provide ultra-reliability and low latency. Acquiring knowledge regarding the number of active devices and their latency-reliability requirements becomes essential to optimize resource allocation in heterogeneous networks. Due to the inherent heavy computati...
Disguised tailing and visual monitoring of suspicious mobile targets is a promising application of security unmanned aerial vehicles (UAVs). But trajectory planning is non-trivial, especially for fixed-wing UAVs with more constrained maneuverability and dynamic models. This paper proposes a new framework to optimize collectively the propulsion powe...
Unmanned aerial vehicle (UAV)-enabled wireless power transfer (WPT) is a viable solution to remotely charge several energy receivers (ERs) in areas with intermittent access to a source of energy. However, given the limited available energy in the on-board battery of the UAV, which is mainly required to suffice propulsion energy consumption, the UAV...
Rate Splitting Multiple Access (RSMA) has recently emerged as a promising technique to enhance the transmission rate for multiple access networks. Unlike conventional multiple access schemes, RSMA requires splitting and transmitting messages at different rates. The joint optimization of the power allocation and rate control at the transmitter is ch...
The next generation of wireless systems will take the concept of communications and networking to another level and turn the vision of Internet of Everything (IoE) into reality. Everywhere connectivity through the integration of terrestrial, aerial, satellite, maritime, and underwater communications is expected in 6G-enabled IoE systems, where vari...
Virtual Reality-embedded Digital Twin (VR-DT) service integrates digital twin with virtual reality (VR) to visualize the digital representation of real-world production, boosting the digital transformation of manufacturing industry in the Industrial Internet of Things (IIoT). Balanced against the advantages of the VR-DT service, its data-driven, co...
This paper proposes joint mobile node participation and routing protocol for multi-hop device-to-device (MD2D) networking in intelligent transportation systems, called fuzzy-based participation and routing protocol for MD2D (FPRM). Our proposed protocol is designed to operate over future open-radio access networks (O-RANs). We introduce a sub-layer...
The sixth-generation (6G) wireless communication has called for higher bandwidth and massive connectivity of Internet-of-Things (IoT) devices. The increased connectivity also demands advanced levels of network security, which are critical to maintaining due to severe signal attenuation at higher frequencies. Intelligent reflecting surface (IRS) is...
The next generation of wireless systems will take the concept of communications and networking to another level through the seamless integration of terrestrial, aerial, satellite, maritime and underwater communication systems. Reconfigurable intelligent surface (RIS) is an innovative technology which, with its singular features and functionalities,...
Edge computing leverages computing resources closer to the end-users at the edge of the network, rather than distant cloud servers in the centralized IoT architecture. Edge computing nodes (ECNs), experience less transmission latency and usually save on energy while network overheads are mitigated. The ECNs can be fixed or mobile in their positions...
Over the past few years, billions of unsecured Internet of Things (IoT) devices have been produced and released, and that number will only grow as wireless technology advances. As a result of their susceptibility to malware, effective methods have become necessary for identifying IoT malware. However, the low generalizability and the non-independen...
The Ethereum blockchain generates a significant amount of data due to its intrinsic transparency and decentralized nature. It is also referred to as on-chain data and is openly accessible to the world. Moreover, the on-chain data is timestamped, integrated, and validated into an open ledger. This important blockchain feature enables us to assess th...
Automatic modulation classification (AMC) can play an important role in the timely identification of suspicious and unwanted signal activities to enable secure communication in future next-generation cellular networks. Moreover, AMC can detect the modulation scheme without even adding additional overhead in the signal. In this paper, we developed a...
Today’s smart city infrastructure is predominantly dependant on Internet of Things (IoT) technologies. IoT technology essentially facilitates a platform for service automation through connections of heterogeneous objects via the Internet backbone. However, the security issues associated with IoT networks make smart city infrastructure vulnerable to...
The Internet of Things (IoT) is an emerging technology that has earned a lot of research attention and technical revolution in recent years. Significantly, IoT connects and integrates billions of devices and communication networks around the world for several real-time IoT applications. On the other hand, cybersecurity attacks on the IoT are growin...
This paper studies the integration of the newly-emerged intelligent reflecting surface (IRS) technology into non-orthogonal multiple access (NOMA)-based wireless powered communication networks (WPCNs). We consider two WPCNs which communicate with a common hybrid access point (HAP), where there exists two types of devices in each WPCN, namely inform...
Intelligent reflecting surface (IRS) has been recently emerged as an effective way for improving the performance of wireless networks by reconfiguring the propagation environment through a large number of passive reflecting elements. This game-changing technology is especially important for stepping into the Internet of Everything (IoE) era, where...
The development of unmanned aerial vehicles (UAVs) is one of the driving forces for revolutionizing wireless communications in the modern era. Although there are many unique features of UAV networks, their widespread use is still hampered by the short battery life. As a result, most of the research efforts in this domain mainly have focused on the...
A feasible approach commonly discussed in the literature for mitigating location privacy threats in vehicular ad hoc networks (VANETs) is the use of pseudonyms instead of real vehicle identifications. However, for relevant authorities to be able to identify misbehaving vehicles through their pseudonyms, it is essential that the privacy protection m...
This paper presents a new approach to accurately and efficiently identifying a large number of wireless devices blindly installed to known three-dimensional installation/fitting points, based on received signal strengths (RSSs) between the devices. The approach is non-trivial because of the factorial, mapping nature of the considered problem, the m...
In this paper, we propose a novel Hybrid-Hierarchical spatial-aerial-Terrestrial Edge-Centric (H 2 TEC) for the space-air integrated Internet of Things (IoT) networks. (H 2 TEC) comprises unmanned aerial vehicles (UAVs) that act as mobile fog nodes to provide the required services for terminal nodes (TNs) in cooperation with the satellites. TNs in...
Caching at the network edge can reap significant advantages to improve service quality by reducing the transmission cost and network congestion. Edge caching with Device-to-Device (D2D) communication helps offload cellular traffic during a surge in network traffic. This paper considers the classic clustering problem for D2D users, followed by an in...
This article proposes the mobile sensor-cloud (MSC) architecture and theoretically characterizes it. The existing literature on sensor-cloud (SC) assumes stationarity of nodes, which limits the use of the associated theoretical models in mobile platforms. This article attempts to address this research lacuna by proposing a model for enabling mobile...
Autonomous vehicles in the Internet of Vehicles (IoV) have the ability to generate their mobility pattern in advance and share it with other vehicles or a central location. This information enables traffic systems to be aware of future traffic flow. However, the current classical traffic systems barely consider the spatial dependency of traffic dat...
Network slicing is expected to emerge as a promising solution for end-to-end resource management and orchestration together with Software Defined Networking (SDN) and Network Function Virtualization (NFV) technologies. In this paper, acomprehensive network slicing framework is presented to achieve end-to-end (E2E) QoS provisioning among customized...
Integrating simultaneous wireless information and power transfer (SWIPT) and cognitive radio (CR) technologies into Internet of Things (IoT) networks, named SWIPT-enabled cognitive IoT networks, has become an effective approach to resolve the short lifetime of battery-constrained IoT devices (IoDs) and spectrum scarcity. In this type of networks, I...
This paper studies a novel design of user pairing and resource allocation in a simultaneous wireless information and power transfer (SWIPT)-enabled cooperative non-orthogonal multiple access (NOMA) system with coexisting power-splitting (PS) and time-switching (TS) users. In this system, near NOMA users (NUs) that are close to a source can assist t...
Applications and technologies of the Internet of Things are in high demand with the increase of network devices. With the development of technologies such as 5G, machine learning, edge computing, and Industry 4.0, the Internet of Things has evolved. This survey article discusses the evolution of the Internet of Things and presents the vision for In...
Intelligent reflecting surface (IRS) has recently been emerged as an effective way for improving the performance of wireless networks by reconfiguring the propagation environment through a large number of passive reflecting elements. This game-changing technology is especially important for stepping into the Internet of Everything (IoE) era, where...
Virtual reality (VR) over wireless has promising applications in healthcare, education, entertainment, and industrial production. However, it is difficult for the existing wireless systems to meet the needs of massive content transmission, ultra-low latency, and high computation in wireless VR. In this article, with the recent advances of edge inte...
This correspondence studies resource allocation for a wireless-powered relay network, where a hybrid relay with constant energy supply assists an energy-constrained source to send confidential information to a destination in the presence of an eavesdropper. We propose a novel transmission protocol termed charge-then-cooperate to support secure comm...
The 6th generation mobile network (6G) is expected to achieve a fully connected world. As a key enabling technology in 6G, edge intelligence (EI) combines artificial intelligence (AI) with mobile edge computing (MEC), further releasing the potential of edge-side data. However, edge resources from roadside units (RSUs) and base stations are insuffic...
Bitcoin generates a massive amount of data every day due to its innate transparency and capacity of operating completely decentralised. In this paper, we introduce on-chain metrics derived from data on the bitcoin network that enable us to describe the state and usage of the underlying network. Based on their characteristics, we classify them into...
This paper addresses the congestion problem in cellular networks through the assistance of parcel delivery drones. Drones have the primary task of parcel delivery and a secondary task of acting as relay nodes (hop) to add extra capacity in a cellular network. Base transceiver stations in the cells can admit ground user equipment to communicate dire...
Superposition coding allows secret messages to be delivered stealthily on top of legacy signals. The effective allocation of the limited transmit power at a transmitter is critical to serve the data rate request of a legacy (untrusted) receiver while accomplishing the stealthy and secure transmissions of secret messages to a trusted receiver, which...
Ram Adapa (Fellow, IEEE) received the B.S. degree from Jawaharlal Nehru Technological University, India, the M.S. degree from IIT Kanpur, India, and the Ph.D. degree from the University of Waterloo, ON, Canada, all in electrical engineering.
With its rapid development recently, edge computing with processing, storage, and networking capabilities has become an important solution to break through the bottleneck of emerging technology development by virtue of its advantages in reducing data transmission, decreasing service latency, and easing cloud computing pressure. Among several applic...
Autonomous tracking of suspicious unmanned aerial vehicles (UAVs) by legitimate monitoring UAVs (or monitors) can be crucial to public safety and security. It is non-trivial to optimize the trajectory of a monitor while conceiving its monitoring intention, due to typically non-convex propulsion and thrust power functions. This paper presents a nove...
Autonomous tracking of suspicious unmanned aerial vehicles (UAVs) by legitimate monitoring UAVs (or monitors) can be crucial to public safety and security. It is non-trivial to optimize the trajectory of a monitor while conceiving its monitoring intention, due to typically non-convex propulsion and thrust power functions. This paper presents a nove...
Applications of unmanned aerial vehicles (UAVs) for data collection are a promising means to extend Internet of Things (IoT) networks to remote and hostile areas and to locations where there is no access to power supplies. The adequate design of UAV velocity control and communication decision making is critical to minimize the data packet losses at...
Optimal content caching has been an important topic in dense small cell networks. Due to spatial and temporal variation in the popularity of data, most content requests cannot be directly served by the lower tiers of the network, increasing the chances of congestion at the core network. This raises the issues of what to cache and where to cache, es...
Relays have been deployed to provide connectivity to heavily blocked and isolated radio environments, but suffer from severe data rate losses due to the half-duplex nature of relays. This paper exploits non-orthogonal multiple access (NOMA) to enhance the sum-rate of two heavily blocked users to and from a base station (BS) via two-way relays (TWRs...
This paper proposes a hybrid-relaying scheme empowered by a self-sustainable intelligent reflecting surface (IRS) in a wireless powered communication network (WPCN), to simultaneously improve the performance of downlink energy transfer (ET) from a hybrid access point (HAP) to multiple users and uplink information transmission (IT) from users to the...
The idea of co-operative caching in a cache-enabled wireless network has gained much interest due to its services in terms of short service delay and improved transmission rate at the user end. In this paper, we consider a co-operative caching mechanism for a fog-enabled Internet of Things (IoT) Network. We propose a delay-minimizing policy for fog...
Underwater communication (UWC) growing over the past few decades is the major tool for exploring the vast underwater space. Research and development of UWC networks are dominantly acoustic (Ac) wave based due to its long coverage capability. However, the demand of low latency and high throughput applications, and the emergence of short-range UWCs i...
Unmanned aerial vehicle (UAV) is a key enabler for communication systems beyond the fifth-generation due to its applications in almost every field including mobile communications and vertical industries. However, there exist many challenges in 3D UAV placement such as resource and power allocation, trajectory optimization, and user association. Thi...
In this paper, we propose a novel mobility model providing train traffic traces essential for train-to-train communication models. As the proposed mobility model works only based on trip timetables and train timetables are currently available in real-time, the produced mobility traces will be also in real-time. Additionally, as no GPS module is use...
Aiding cellular networks by unmanned aerial vehicles (UAVs) is a leap forward to address the ever-rising, multifarious, and dynamic traffic demands. The UAV utilization in wireless communication presents essential advantages, such as position control and appealing line-of-sight (LoS) components. In this paper, we consider a UAV deployed as an aeria...
Despite increase in deployment of BS, MNOs are still faced with the daunting challenge of providing adequate coverage and capacity in indoor environments. Furthermore, the trust-less environment in which MNOs operate makes it further challenging to achieve interoperability across carriers. Recently the concept of mOs has emerged as a promising solu...
In this paper, we propose three algorithms for placement of access points (APs) for the purpose of data transportation via train-to-wayside (T2W) communications along a rail network. The first algorithm is proposed to find the minimum number of APs so that the path-loss (PL) does not exceed a desired threshold. Through the second algorithm, the mos...
This paper considers that a transmitter superposes secrecy transmissions to a closer receiver with a high security level in the active MIMO-OFDM channel it is using to send data to a farther receiver with a low security level, by using NOMA techniques. A joint optimization of power allocation and beamforming is important to maximize the secrecy rat...
Overhead transmission line sag is a crucial parameter that needs to be measured for safe and efficient power transmission. Due to this reason, real time measurement of transmission line sag is necessary in a smart power grid. The ability of smart grid to facilitate real-time monitoring of different power system parameters allows sag measurement and...
In the next-generation heterogeneous wireless networks, designing authentication protocols that meet the demand of mobile users/applications is a challenge. This paper proposes authentication and re-authentication protocols for 4G wireless networks, in particular, LTE-Advanced (LTE-A), WLAN, and WiMAX-Advanced (WiMAX-A) interworking architecture. T...
This paper addresses the formulation of power allocation for cluster based multihop vehicular relaying communications in order to improve the network quality-of-services (QoS). The cluster-to-cluster (C2C) channel is completely depending on the power gain of vehicle-to-vehicle (V2V) channel that increases the difficulties of the power allocation pr...
In this paper, we study a two-way dual-hop wireless powered communication network (DH-WPCN), wher