Mohsen Guizani’s research while affiliated with Mohamed bin Zayed University of Artificial Intelligence and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (579)


Quantum Machine Learning for 6G Space-Air-Ground Integrated Networks: A Comprehensive Tutorial and Survey
  • Preprint
  • File available

May 2025

·

32 Reads

·

·

·

[...]

·

Choong Seon Hong
Download

Harnessing Nature-Inspired Algorithms for Energy-Efficient Artificial Intelligence of Things

May 2025

·

14 Reads

IEEE Internet of Things Journal

This paper aims at analyzing and comparing an adaptive algorithm-based method for improving the performance of Internet of Things (IoT) systems through simulation studies. Concentrating on active and complex scenarios, the study presents new proposals for secure and smart learning of routes, activity forecasting for nodes, link stability estimation, and flexible resource management. These methods are benchmarked against conventional algorithms to evaluate the effectiveness of the proposed solution based on routing efficiency, traffic prediction, link, resource consumption, network response time, and energy requirements. The findings are encouraging, the adaptive algorithms do improve dramatically on the standard ones making the system slower and consuming much less power. From the findings of the study it can be concluded that using adaptive algorithms in IoT can have a high impact in terms of improvement in efficiency as well as sustainability. We conclude this work by providing some directions for further research and development in the IoT field.


Federated Learning for Trust Enhancement in UAV-Enabled IoT Networks: A Unified Approach

April 2025

·

27 Reads

IEEE Internet of Things Journal

This study presents a federated learning (FL) framework tailored for UAV-enabled IoT networks, addressing challenges in efficiency, robustness, and scalability. The proposed system improves model learning with a 14.9 percentage point increase in accuracy (75.5% to 90.4%) and a 69.2% reduction in loss over ten training epochs. It demonstrates resilience, limiting accuracy reduction to 7% under simulated attacks, and scalability with a linear increase in processing times as network size grows. High anomaly detection rates (92%) further enhance network security and reliability. These results validate the framework’s effectiveness in UAV networks and highlight its broader potential for IoT applications. Future work will explore further enhancements and diverse applications.



PRIMA.CPP: Speeding Up 70B-Scale LLM Inference on Low-Resource Everyday Home Clusters

April 2025

·

2 Reads

Emergency of DeepSeek R1 and QwQ 32B have broken through performance barriers for running frontier large language models (LLMs) on home devices. While consumer hardware is getting stronger and model quantization is improving, existing end-side solutions still demand GPU clusters, large RAM/VRAM, and high bandwidth, far beyond what a common home cluster can handle. This paper introduces prima.cpp, a distributed inference system that runs 70B-scale models on everyday home devices using a mix of CPU/GPU, low RAM/VRAM, Wi-Fi, and cross-platform support. It uses mmap to manage model weights and introduces piped-ring parallelism with prefetching to hide disk loading. By modeling heterogeneity in computation, communication, disk, memory (and its management behavior), and OS, it optimally assigns model layers to each device's CPU and GPU, further reducing token latency. An elegant algorithm named Halda is proposed to solve this NP-hard assignment problem. We evaluate prima.cpp on a common four-node home cluster. It outperforms llama.cpp, exo, and dllama on 30B+ models while keeping memory pressure below 6%. This brings frontier 30B-70B models, such as Llama 3, DeepSeek R1, Qwen 2.5, and QwQ to home assistants, making advanced AI truly accessible to individuals. The code is open source and available at https://github.com/Lizonghang/prima.cpp.


Conceptional framework for human–AI co-evolution.
Evolution of LLM Fine-Tuning.
Key technical features of TFT.
LLM Fine-Tuning: Concepts, Opportunities, and Challenges

April 2025

·

78 Reads

As a foundation of large language models, fine-tuning drives rapid progress, broad applicability, and profound impacts on human–AI collaboration, surpassing earlier technological advancements. This paper provides a comprehensive overview of large language model (LLM) fine-tuning by integrating hermeneutic theories of human comprehension, with a focus on the essential cognitive conditions that underpin this process. Drawing on Gadamer’s concepts of Vorverständnis, Distanciation, and the Hermeneutic Circle, the paper explores how LLM fine-tuning evolves from initial learning to deeper comprehension, ultimately advancing toward self-awareness. It examines the core principles, development, and applications of fine-tuning techniques, emphasizing its growing significance across diverse field and industries. The paper introduces a new term, “Tutorial Fine-Tuning (TFT)”, which annotates a process of intensive tuition given by a “tutor” to a small number of “students”, to define the latest round of LLM fine-tuning advancements. By addressing key challenges associated with fine-tuning, including ensuring adaptability, precision, credibility and reliability, this paper explores potential future directions for the co-evolution of humans and AI. By bridging theoretical perspectives with practical implications, this work provides valuable insights into the ongoing development of LLMs, emphasizing their potential to achieve higher levels of cognitive and operational intelligence.


Overview of AI and communication for 6G network: fundamentals, challenges, and future research opportunities

April 2025

·

470 Reads

·

4 Citations

Science China Information Sciences

With the growing demand for seamless connectivity and intelligent communication, the integration of artificial intelligence (AI) and sixth-generation (6G) communication networks has emerged as a transformative paradigm. By embedding AI capabilities across various network layers, this integration enables optimized resource allocation, improved efficiency, and enhanced system robust performance. This paper presents a comprehensive overview of AI and communication for 6G networks, with a focus on their foundational principles, inherent challenges, and future research opportunities. We first review the integration of AI and communications in the context of 6G, exploring the driving factors behind incorporating AI into wireless communications, as well as the vision for the convergence of AI and 6G. The discourse then transitions to a detailed exposition of the envisioned integration of AI within 6G networks, divided into three progressive stages. The first stage, AI for network, focuses on employing AI to augment network performance, optimize efficiency, and enhance user service experiences. The second stage, network for AI, highlights the role of the network in facilitating and buttressing AI operations and presents key enabling technologies. We compare wireless network large models with conventional large language models (LLMs), and identify key design principles and components for building wireless network architectures. In the final stage, AI as a service, it is anticipated that future 6G networks will innately provide AI functions as services, supporting application scenarios like immersive communication and intelligent industrial robots. Specifically, we define the quality of AI service, which refers to a framework for measuring AI services within the network. We further summarize the standardization process of AI for wireless networks, highlighting key milestones and ongoing efforts. In addition, we analyze the critical challenges faced by the integration of AI and communications in 6G. Finally, we outline promising future research opportunities that are expected to drive the development and refinement of AI and 6G communications.


Safeguarding connected autonomous vehicle communication: Protocols, intra- and inter-vehicular attacks and defenses

April 2025

·

54 Reads

·

2 Citations

Computers & Security

The advancements in autonomous driving technology, coupled with the growing interest from automotive manufacturers and tech companies, suggest a rising adoption of Connected Autonomous Vehicles (CAVs) in the near future. Despite some evidence of higher accident rates in AVs, these incidents tend to result in less severe injuries compared to traditional vehicles due to cooperative safety measures. However, the increased complexity of CAV systems exposes them to significant security vulnerabilities, potentially compromising their performance and communication integrity. This paper contributes by presenting a detailed analysis of existing security frameworks and protocols, focusing on intra- and inter-vehicle communications. We systematically evaluate the effectiveness of these frameworks in addressing known vulnerabilities and propose a set of best practices for enhancing CAV communication security. The paper also provides a comprehensive taxonomy of attack vectors in CAV ecosystems and suggests future research directions for designing more robust security mechanisms. Our key contributions include the development of a new classification system for CAV security threats, the proposal of practical security protocols, and the introduction of use cases that demonstrate how these protocols can be integrated into real-world CAV applications. These insights are crucial for advancing secure CAV adoption and ensuring the safe integration of autonomous vehicles into intelligent transportation systems.


FIGURE 1. Concrete steps for our sustainable and trustworthy 6G wireless network.
FIGURE 3. Framework of the symbiotic blockchain network.
FIGURE 6. Simulation results of energy consumption and latency. (a) (b)
Convergence of Symbiotic Communications and Blockchain for Sustainable and Trustworthy 6G Wireless Networks

April 2025

·

6 Reads

·

1 Citation

IEEE Wireless Communications

Symbiotic communication (SC) is known as a new wireless communication paradigm, similar to the natural ecosystem population, and can enable multiple communication systems to cooperate and mutualize through service exchange and resource sharing. As a result, SC is seen as an important potential technology for future sixth-generation (6G) communications, solving the problem of lack of spectrum resources and energy inefficiency. Symbiotic relationships among communication systems can complement radio resources in 6G. However, the absence of established trust relationships among diverse communication systems presents a formidable hurdle in ensuring efficient and trusted resource and service exchange within SC frameworks. To better realize trusted SC services in 6G, in this article, we propose a solution called a symbiotic blockchain network (SBN) that combines SC and blockchain. Specifically, we first use cognitive backscatter communication to transform blockchain consensus, that is, the symbiotic blockchain consensus (SBC) so that it can be better suited for the wireless network. Then, for SBC, we propose a highly energy-efficient sharding scheme to meet the extremely low power consumption requirements in 6G. Finally, such a blockchain scheme guarantees trusted transactions of communication services in SC. Through ablation experiments, our proposed SBN demonstrates significant efficacy in mitigating energy consumption and reducing processing latency in adversarial networks, which is expected to achieve a sustainable and trusted 6G wireless network.



Citations (25)


... We note that several articles highlight the prominent challenges and issues with the LLMs [27], [28]. The most relevant challenges to threat modeling include incorrect predictions and LLM hallucinations, which may result in disregarding required countermeasures or implementing unnecessary security measures. ...

Reference:

LLMs' Suitability for Network Security: A Case Study of STRIDE Threat Modeling
A Survey on Large Language Models for Communication, Network, and Service Management: Application Insights, Challenges, and Future Directions
  • Citing Article
  • January 2025

IEEE Communications Surveys & Tutorials

... The introduction of OSWorld provides a scalable platform for multimodal agents, allowing them to engage in interactive learning, which can be instrumental in evaluating how various operating systems can support diverse learning experiences [15]. Furthermore, advancements in federated learning that enhance client availability and selection underscore the importance of efficient learning methods to adapt to diverse user needs and contexts [16]. Each of these contributions emphasizes the significance of integrating innovative technologies and approaches to create more accessible and effective learning environments. ...

On-Demand Model and Client Deployment in Federated Learning with Deep Reinforcement Learning
  • Citing Article
  • January 2025

IEEE Internet of Things Journal

... For example, Samsung's SmartThings platform, enhanced with remote Galaxy AI, processes multimodal sensor data in smart homes to support real-time voice and gesture recognition, delivering Z. Wang personalized automation to over 62 million users. Despite these advancements, conventional deployment paradigms that leverage LAMs via cloud servers suffer from high latency and privacy risks, limiting their ability to meet the stringent Quality of Service (QoS) requirements [3] of IoT applications. To address these limitations, we propose to deploy LAMs at the network edge, referred to as edge LAMs, to reduce latency while preserving data privacy, thereby enabling realtime, reliable, and personalized intelligent IoT services. ...

Overview of AI and communication for 6G network: fundamentals, challenges, and future research opportunities

Science China Information Sciences

... To answer these questions, we leverage blockchain to ensure the reliability and security of information transmission in Mul-tiLLMNs. Specifically, blockchain consensus mechanisms enable each LLM to make decisions independently of third-party authorities through a decentralized voting process [17], [18]. Existing research on blockchain-enabled LLMs has focused mainly on distributed training processes and the traceability of generated content, such as [19], [20], and [21]. ...

Convergence of Symbiotic Communications and Blockchain for Sustainable and Trustworthy 6G Wireless Networks

IEEE Wireless Communications

... • We expand the channel reciprocity assumption assessment in [43], [44], utilizing low-cost microcontroller boards with limited resources. We identify implementation limitations that impact channel reciprocity negatively, and investigate metrics that best measure and quantify reciprocity. ...

On the Detection of Replay Authentication Attacks Through Channel State Information Analysis
  • Citing Conference Paper
  • December 2024

... Jiang et al. [13] identified four primary research directions for security enhancement in IoT and connected vehicles: authentication, access control, management, and low-cost encryption schemes. Alfardus and Rawa [14] developed an RNN-based detection system using wavelet transforms for real-time IVN protection. Aledhari et al. [15] proposed new CAV security protocols and threat classifications. ...

Safeguarding connected autonomous vehicle communication: Protocols, intra- and inter-vehicular attacks and defenses

Computers & Security

... Edge AI may be described as the implementation of AI models on edge devices to perform real-time processing with minimal recourse to the cloud, as in using IoT sensors, mobile phones, or embedded systems (Hadish et al., 2024). Although large language models exhibited very high-quality performance in NLP and decision-making tasks, the amount of computation required exceeds the capacity for deployment on the edge. ...

Language Models at the Edge: A Survey on Techniques, Challenges, and Applications
  • Citing Conference Paper
  • November 2024

... Furthermore, we compared our reputation model with the PRBTD method [25] to illustrate its effectiveness across different user categories: good, unintentional, and intentional users. For good users as shown in Fig. 9, the reputation trajectories in our model demonstrate faster and more consistent improvement. ...

Can We Enhance the Quality of Mobile Crowdsensing Data Without Ground Truth?
  • Citing Article
  • January 2025

IEEE Transactions on Mobile Computing

... Synchronization of sleep-wake cycles in energy-limited computing devices optimizes power utilization that requires synchronized time for IoT-based systems to coordinate operations and to reduce unnecessary power consumption [129]. Time synchronization for edge, fog devices creates a consistent timestamp framework that prevents both duplicated data and inconsistencies that are crucial for federated learning and decentralized analytics [130] demanding timely data aggregation. The examination of restricted environments forms the focus of [131] and [132] which introduce compound methods to merge precise timing with better scalability in hierarchical systems. ...

Edge-End Cooperative Network Resource Allocation With Time Synchronization Awareness for Federated Learning-Based Distributed Energy Regulation
  • Citing Article
  • January 2025

IEEE Transactions on Smart Grid

... Cluster 1 (n = 36, red) encompasses various aspects of the modern educational process, which increasingly relies on digital technologies, online interaction, and collaborative learning methods. We have designated this cluster as "Contemporary Approaches to Learning and Education in the Digital Era", as exemplified in the work of N. M. Hijazi, M. Aloqaily and M. Guizani [31]. ...

Collaborative IoT learning with secure peer-to-peer federated approach
  • Citing Article
  • December 2024

Computer Communications