Eryk Dutkiewicz's research while affiliated with University of Technology Sydney and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (489)
Unmanned aerial vehicles (UAVs)-assisted wireless sensor networks (WSNs) have tremendous potential applications due to their flexibility and rapid deployment. Hybrid time-of-arrival (TOA) and angle-of-arrival (AOA) localization techniques are commonly used due to their high accuracy. Conventional TOA/AOA localization algorithms require both zenith...
A wireless network serving multiple users in the millimeter-wave or the sub-terahertz band by a base station is considered. High-throughput multi-user hybrid-transmit beamforming is conceived by maximizing the minimum rate of the users. For the sake of energy-efficient signal transmission, the array-of-subarrays structure is used for analog beamfor...
This work proposes a novel framework to address straggling and privacy issues for federated learning (FL)-based mobile application services, considering limited computing/communications resources at mobile users (MUs)/mobile application provider (MAP), privacy cost, the rationality and incentive competition among MUs in contributing data to the MAP...
With the escalating prevalence of malicious activities exploiting vulnerabilities in blockchain systems, there is an urgent requirement for robust attack detection mechanisms. To address this challenge, this paper presents a novel collaborative learning framework designed to detect attacks in blockchain transactions and smart contracts by analyzing...
This article introduces a novel lightweight framework using ambient backscattering communications to counter eavesdroppers. In particular, our framework divides an original message into two parts: (i) the active-transmit message transmitted by the transmitter using conventional RF signals and (ii) the backscatter message transmitted by an ambient b...
Full-dimensional (FD) multi-user massive multiple-input multiple output (m-MIMO) systems employ large two-dimensional (2D) rectangular antenna arrays to control both the azimuth and elevation angles of signal transmission. We introduce the sum of two outer products of the azimuth and elevation beamforming vectors having moderate dimensions as a new...
In this paper, we propose FedChain, a novel framework for federated-blockchain systems, to enable effective transferring of tokens between different blockchain networks. Particularly, we first introduce a federated-blockchain system together with a cross-chain transfer protocol to facilitate the secure and decentralized transfer of tokens between c...
A new hybrid amalgam of analog and baseband digital beamforming is conceived for millimeter-wave (mmWave) multi-user networks. The base station is equipped with a large-scale antenna-array, which however relies on a limited number of radio frequency chains for mitigating the severe path-loss of mmWave band transmission. Each user is also equipped w...
Rate Splitting Multiple Access (RSMA) has emerged as an effective interference management scheme for applications that require high data rates. Although RSMA has shown advantages in rate enhancement and spectral efficiency, it has yet not to be ready for latency-sensitive applications such as virtual reality streaming, which is an essential buildin...
Due to its security, transparency, and flexibility in verifying virtual assets, blockchain has been identified as one of the key technologies for Metaverse. Unfortunately, blockchain-based Metaverse faces serious challenges such as massive resource demands, scalability, and security concerns. To address these issues, this paper proposes a novel sha...
Integrated Communications and Sensing (ICS) has recently emerged as an enabling technology for ubiquitous sensing and IoT applications. For ICS application to Autonomous Vehicles (AVs), optimizing the waveform structure is one of the most challenging tasks due to strong influences between sensing and data communication functions. Specifically, the...
p>Federated Learning (FL) plays a pivotal role in enabling artificial intelligence (AI)-based mobile applications in mobile edge computing (MEC). However, due to the resource heterogeneity among participating mobile users (MUs), delayed updates from slow MUs may deteriorate the learning speed of the MEC-based FL system, commonly referred to as the...
p>Federated Learning (FL) plays a pivotal role in enabling artificial intelligence (AI)-based mobile applications in mobile edge computing (MEC). However, due to the resource heterogeneity among participating mobile users (MUs), delayed updates from slow MUs may deteriorate the learning speed of the MEC-based FL system, commonly referred to as the...
Decoding brain signals can not only reveal Metaverse users' expectations but also early detect error-related behaviors such as stress, drowsiness, and motion sickness. For that, this article proposes a pioneering framework using wireless/over-the-air Brain-Computer Interface (BCI) to assist creation of virtual avatars as human representation in the...
This work proposes a novel framework to dynamically and effectively manage and allocate different types of resources for Metaverse applications, which are forecasted to demand massive resources of various types that have never been seen before. Specifically, by studying functions of Metaverse applications, we first propose an effective solution to...
Full-dimensional (FD) multi-user massive multiple input multiple output (m-MIMO) systems employ large two-dimensional (2D) rectangular antenna arrays to control both the azimuth and elevation angles of signal transmission. We introduce the sum of two outer products of the azimuth and elevation beamforming vectors having moderate dimensions as a new...
Latent graph structure and stimulus of graph-structured data contain critical private information, such as brain disorders in functional magnetic resonance imaging data, and can be exploited to identify individuals. It is critical to perturb the latent information while maintaining the utility of the data, which, unfortunately, has never been addre...
This paper investigates reconfigurable intelligent surface (RIS)-aided OFDM network, where a multiple-antenna aided base station (BS) transmits its downlink (DL) signals to multiple single-antenna users via an RIS, which consists of a considerable amount of low-resolution programmable reflecting elements (PREs). Explicitly, we propose the joint des...
This paper focuses on a network scenario where a multi-antenna access point serves multiple single-antenna users in the presence of multiple eavesdroppers, with the aid of a reconfigurable intelligent surface (RIS). The RIS employs low-resolution programmable reflecting elements (PREs) for cost-effective implementation. In order to establish secure...
Due to its security, transparency, and flexibility in verifying virtual assets, blockchain has been identified as one of the key technologies for Metaverse. Unfortunately, blockchain-based Metaverse faces serious challenges such as massive resource demands, scalability, and security/privacy concerns. To address these issues, this paper proposes a n...
This letter presents a novel approach for spectrum sensing in cognitive satellite-terrestrial networks. The approach uses multi-agent deep reinforcement learning (DRL) and reconfigurable intelligent surface to address the problem of under-utilization of terrestrial network spectrum in remote areas. Unlike previous studies that rely only on current...
Scalable algorithms are conceived for obtaining the sum-rate capacity of the reconfigurable intelligent surface (RIS)-aided multiuser (MU) multiple-input multiple-output (MIMO) broadcast channel (BC), where a multi-antenna base station (BS) transmits signals to multi-antenna users with the help of an RIS equipped with a massive number of finite-res...
Toward user-driven Metaverse applications with fast wireless connectivity and tremendous computing demand through future 6G infrastructures, we propose a Brain-Computer Interface (BCI) enabled framework that paves the way for the creation of intelligent human-like avatars. Our approach takes a first step toward the Metaverse systems in which the di...
Federated Learning (FL) with quantization and deliberately added noise over wireless networks is a promising approach to preserve the user differential privacy while reducing the wireless resources. Specifically, an FL learning process can be fused with quantized Binomial mechanism-based updates contributed by multiple users to reduce the communica...
This paper considers hybrid beamforming consisting of analog beamforming (ABF) coupled with digital baseband beamforming (DBF) which is designed for multi-user (MU) multiple input multiple output (MIMO) millimeter-wave (mmWave) communications. ABF uses a limited number of radio frequency (RF) chains and finite-resolution phase-shifters to alleviate...
A multi-antenna aided base station (BS) supporting several multi-antenna downlink users with the aid of a reconfigurable intelligent surface (RIS) of programmable reflecting elements (PREs) is considered. Low-resolution PREs constrained by a set of sparse discrete values are used for reasons of cost efficiency. Our challenging objective is to joint...
This paper develops a novel framework to defeat a super-reactive jammer, one of the most difficult jamming attacks to deal with in practice. Specifically, the jammer has an unlimited power budget and is equipped with the self-interference suppression capability to simultaneously attack and listen to the transmitter’s activities. Consequently, deali...
This paper considers a cell-free massive multiple-input multiple-output network (cfm-MIMO) with a massive number of access points (APs) distributed across an area to deliver information to multiple users. Based on only local channel state information, conjugate beamforming is used under both proper and improper Gaussian signalings. To accomplish th...
This article proposes a cooperative friendly jamming framework for swarm unmanned aerial vehicle (UAV)-assisted amplify-and-forward (AF) relaying networks with wireless energy harvesting. In particular, we consider a swarm of hovering UAVs that relays information from a terrestrial base station to a distant mobile user and simultaneously generates...
With outstanding features, machine learning (ML) has become the backbone of numerous applications in wireless networks. However, the conventional ML approaches face many challenges in practical implementation, such as the lack of labeled data, the constantly changing wireless environments, the long training process, and the limited capacity of wire...
The latest advances in several emerging technologies such as AI, blockchain, privacy-preserving algorithms used in localization and positioning systems, cloud computing and computer vision all have great potential in facilitating social distancing. Benefits range from supporting people to work from home to monitoring micro- and macro- movements suc...
Rate Splitting Multiple Access (RSMA) has emerged as an effective interference management scheme for applications that require high data rates. Although RSMA has shown advantages in rate enhancement and spectral efficiency, it has yet not to be ready for latency-sensitive applications such as virtual reality streaming, which is an essential buildin...
Internet of Things, or IoT has been playing an important part in human’s lives. Nonetheless, the rapid growth of IoT-based services may lead to an increase in IoT-based attacks that compromise sensitive user data. IoT-based attack detection and prevention is thus essential for the development of IoT-based network technologies. However, this is a di...
Recent studies have shown that low-resolution analog-to-digital-converters and digital-to-analog-converters (ADCs and DACs) can make fully-digital beamforming more power efficient than its analog or hybrid beamforming counterpart over wide-band millimeter-wave (mmWave) channels. Inspired by this, we propose a computationally efficient fully-digital...
Creating and maintaining the Metaverse requires enormous resources that have never been seen before, especially computing resources for intensive data processing to support the extended reality, enormous storage resources, and massive networking resources for maintaining ultra high-speed and low-latency connections. Therefore, this work aims to pro...
Intrusion detection (ID) on the cloud environment has received paramount interest over the last few years. Among the latest approaches, machine learning-based ID methods allow us to discover unknown attacks. However, due to the lack of malicious samples and the rapid evolution of diverse attacks, constructing a cloud ID system (IDS) that is robust...
The success of fog radio access networks (F-RANs) is critically dependent on the potential quality of service (QoS) that they can offer to users in the face of capacity-constrained fronthaul links and limited caches at their remote radio heads (RRHs). In this context, the collaborative beamforming design is very challenging, since it constitutes a...
A smart grid is an important application in Industry 4.0 with a lot of new technologies and equipment working together. Hence, sensitive data stored in the smart grid is vulnerable to malicious modification and theft. This paper proposes a framework to build a smart grid based on a highly effective private Ethereum network. Our framework provides a...
This article aims to study intrusion attacks and then develop a novel cyberattack detection framework for blockchain networks. Specifically, we first design and implement a blockchain network in our laboratory. This blockchain network will serve two purposes, i.e., generate the real traffic data (including both normal data and attack data) for our...
The authors investigate the use of deep learning in wireless indoor localization to address the shortcomings of the existing range‐based (e.g. trilateration and triangulation) and range‐free (e.g. fingerprinting) localization. Instead of relying on geometric models and hand‐picked features, deep learning can automatically extract the relationship b...
In Joint Communication and Radar (JCR)-based Autonomous Vehicle (AV) systems, optimizing waveform structure is one of the most challenging tasks due to strong influences between radar and data communication functions. Specifically, the preamble of a data communication frame is typically leveraged for the radar function. As such, the higher number o...
This paper considers a network of a multi-antenna array base station (BS) and a reconfigurable intelligent surface (RIS) to deliver both information to information users (IUs) and power to energy users (EUs). The RIS links the connection between the IUs and the BS as there is no direct path between the former and the latter. The EUs are located nea...
This paper introduces a novel solution to enable covert communication in wireless systems by using ambient backscatter communication technology. In the considered system, the original message at the transmitter is first divided into two parts: (i) active transmit message and (ii) backscatter message. Then, the active transmit message is transmitted...
This paper considers a network of a multi-antenna array base station (BS) and a reconfigurable intelligent surface (RIS) to deliver both information to information users (IUs) and power to energy users (EUs). The RIS links the connection between the IUs and the BS as there is no direct path between the former and the latter. The EUs are located nea...
By executing offloaded tasks from mobile users, edge computing augments mobile user equipments (UEs) with computing/communications resources from edge nodes (ENs), enabling new services (e.g., real-time gaming). However, despite being more resourceful than UEs, allocating ENs' resources to a given favorable set of users (e.g., closer to ENs) may bl...
Coded distributed computing (CDC) has recently emerged to be a promising solution to address the straggling effects in conventional distributed computing systems. By assigning redundant workloads to the computing nodes, CDC can significantly enhance the performance of the whole system. However, since the core idea of CDC is to introduce redundancie...
Unmanned-aerial-vehicle (UAV)-assisted data collection has been emerging as a prominent application due to its flexibility, mobility, and low operational cost. However, under the dynamic and uncertainty of Internet of Things data collection and energy replenishment processes, optimizing the performance for UAV collectors is a very challenging task....
Most conventional Federated Learning (FL) models are using a star network topology where all users aggregate their local models at a single server (e.g., a cloud server). That causes significant overhead in terms of both communications and computing at the server, delaying the training process, especially for large scale FL systems with straggling...
Federated Learning (FL) has recently become an effective approach for cyberattack detection systems, especially in Internet-of-Things (IoT) networks. By distributing the learning process across IoT gateways, FL can improve learning efficiency, reduce communication overheads and enhance privacy for cyberattack detection systems. However, one of the...
A design of a diplexing in-band full-duplex (IBFD) slot antenna based on the quadruple-mode resonator (QMR) is presented for the first time. First, a two-way waveguide diplexer integration using QMR is designed. Four waveguide modes, namely, TE
$_{011}$
, TE
$_{101}$
, TM
$_{\mathrm{210,}}$
and TM
$_{120}$
, are primarily used. These four modes...
Metaverse has recently attracted paramount attention due to its potential for future Internet. However, to fully realize such potential, Metaverse applications have to overcome various challenges such as massive resource demands, interoperability among applications, and security and privacy concerns. In this paper, we propose MetaChain, a novel blo...
Major bottlenecks of large-scale Federated Learning (FL) networks are the high costs for communication and computation. This is due to the fact that most of current FL frameworks only consider a star network topology where all local trained models are aggregated at a single server (e.g., a cloud server). This causes significant overhead at the serv...
Federated Learning (FL) has recently become an effective approach for cyberattack detection systems, especially in Internet-of-Things (IoT) networks. By distributing the learning process across IoT gateways, FL can improve learning efficiency, reduce communication overheads and enhance privacy for cyberattack detection systems. Challenges in implem...
In this work, we propose a novel framework to address straggling and privacy issues for federated learning (FL)-based mobile application services, taking into account limited computing/communications resources at mobile users (MUs)/mobile application provider (MAP), privacy cost, the rationality and incentive competition among MUs in contributing d...
Federated learning (FL) can empower Internet-of-Vehicles (IoV) to help the vehicular service provider (VSP) improve the global model accuracy for road safety and better profits for both VSP and participating smart vehicles (SVs). Nonetheless, there exist major challenges when implementing FL in IoV including dynamic activities and diverse quality-o...
Relay-aided multi-user OFDM is investigated under which multiple sources transmit their signals to a multi-antenna relay during the first relaying stage and then the relay amplifies and forwards the composite signal to all destinations during the second stage. The signal transmission of both stages experience frequency selectivity. The relay is pow...
Most conventional Federated Learning (FL) models are using a star network topology where all users aggregate their local models at a single server (e.g., a cloud server). That causes significant overhead in terms of both communications and computing at the server, delaying the training process, especially for large scale FL systems with straggling...
Major bottlenecks of large-scale Federated Learning(FL) networks are the high costs for communication and computation. This is due to the fact that most of current FL frameworks only consider a star network topology where all local trained models are aggregated at a single server (e.g., a cloud server). This causes significant overhead at the serve...
Accurate assessment of fish quality is difficult in practice due to the lack of trusted fish provenance and quality tracking information. Working with Sydney Fish Market (SFM), we develop a Blockchain-enabled Fish provenance And Quality Tracking (BeFAQT) system. A multi-layer Blockchain architecture based on Attribute-Based Encryption (ABE) is prop...
A multi-user fog radio access network (F-RAN) is designed for supporting content-centric services. The requested contents are partitioned into sub-contents, which are then ‘beamformed’ by the remote radio heads (RRHs) for transmission to the users. Since a large number of beamformers must be designed, this poses a computational challenge. We tackle...
A multi-user fog radio access network (F-RAN) is designed for supporting content-centric services. The requested contents are partitioned into sub-contents, which are then 'beam- formed' by the remote radio heads (RRHs) for transmission to the users. Since a large number of beamformers must be designed, this poses a computational challenge. We tack...
This article proposes a cooperative friendly jamming framework for swarm unmanned aerial vehicle (UAV)-assisted amplify-and-forward (AF) relaying networks with wireless energy harvesting. Due to the limited energy of the UAVs, we develop a collaborative time-switching relaying protocol which allows the UAVs to collaborate to harvest wireless energy...
This papers considers a reconfigurable intelligent surface (RIS)-aided network, which relies on a multiple antenna array aided base station (BS) and a RIS for serving multiple single antenna downlink users. To provide reliable links to all users over the same bandwidth and same time-slot, the paper proposes the joint design of linear transmit beamf...