Zubair Md Fadlullah’s research while affiliated with Western University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (148)


Fig. 1: Illustration of the indoor layouts.
Deep Learning-based Physical Layer Authentication in LiFi Networks Under Multi - User Mobility
  • Conference Paper
  • Full-text available

April 2025

·

48 Reads

·

Eslam Hasan

·

·

[...]

·

Zubair Md Fadlullah

The open nature of wireless networks poses significant security challenges. Upper-layer authentication (ULA) methods face limitations, including vulnerability to cryptanaly-sis and replay attacks. Physical-layer authentication (PLA) has emerged as a promising technique to complement the ULA, offering robust two-factor authentication. PLA leverages physical-layer characteristics to authenticate transmitters with reduced complexity and latency. In this paper, we focus on passive PLA schemes for indoor Light Fidelity (LiFi) networks, where approximately 80% of data traffic originates indoors. Existing studies overlook channel impulse response (CIR) similarity under multiuser mobility and varying user densities, resulting in a lack of robust PLA solutions. To address this gap, we investigate CIR similarity in indoor LiFi environments. Our simulation results demonstrated that the CIR similarity is significant under multiuser mobility, where the attacker can share more than 30% of the CIR of a legitimate user. We propose a deep learning-based Long Short-Term Memory (LSTM) model that predicts the next CIR value based on historical data to enhance authentication reliability. Authentication is performed if the predicted CIR matches the actual CIR at the access point. Our numerical results show that the proposed LSTM-based PLA method effectively distinguishes legitimate users, achieving a detection probability exceeding 94% even under high multiuser mobility. Furthermore, the proposed LSTM-based PLA method can maintain the missed detection and the false alarm under 6% and 3% in the worst-case scenario, respectively.

Download

Optimizing User-Centric Clustering and Pilot Assignment in Cell-Free Networks for Enhanced Spectral Efficiency

January 2025

·

2 Reads

IEEE Internet of Things Journal

Cell-free networks have emerged as a new paradigm for beyond-5G networks, offering uniform coverage and improved control over interference. However, scalability poses a challenge in full cell-free networks, where all access points (APs) serve all users. This challenge is addressed by user-centric clustering, where each user is served by a subset of APs, reducing complexity while maintaining coverage. In this paper, we provide an analysis of the relation between the user-centric clustering and pilot assignment problems in cell-free networks, and introduce a formulation which decouples both problems enabling each to be solved independently. We present a general problem formulation for the user-centric clustering problem, allowing the use of diverse per-user and network-wide performance metrics. Specifically, we focus on one instance of this framework, utilizing per-user spectral efficiency and network-wide sum spectral efficiency (SE) as metrics. Additionally, we formulate the pilot assignment problem to minimize overall channel estimation error while considering the user-centric clusters in evaluating the desirability of pilot assignments, which leads to better performing solutions. Both problems are classified as binary nonlinear programs that are at least NP-hard. To solve these optimization problems, our proposed methodology employs sample average approximation coupled with surrogate optimization for the user-centric clustering problem and utilizes the genetic algorithm for the pilot assignment problem. Numerical experiments demonstrate that the optimized solutions surpass baseline solutions, leading to significant improvements in spectral efficiency.



Communication-Efficient and Privacy-Preserving Federated Learning Via Joint Knowledge Distillation and Differential Privacy in Bandwidth-Constrained Networks

November 2024

·

130 Reads

·

3 Citations

IEEE Transactions on Vehicular Technology

The development of high-quality deep learning models demands the transfer of user data from edge devices, where it originates, to centralized servers. This central training approach has scalability limitations and poses privacy risks to private data. Federated Learning (FL) is a distributed training framework that empowers physical smart systems devices to collaboratively learn a task without sharing private training data with a central server. However, FL introduces new challenges to Beyond 5G (B5G) networks, such as communication overhead, system heterogeneity, and privacy concerns, as the exchange of model updates may still lead to data leakage. This paper explores the communication overhead and privacy risks facing the implementation of FL and presents an algorithm that encompasses Knowledge Distillation (KD) and Differential Privacy (DP) techniques to address these challenges in FL. We compare the operational flow and network model of model-based and model-agnostic (KD-based) FL algorithms that enable customizing per-client model architecture to accommodate heterogeneous and constrained system resources. Our experiments show that KD-based FL algorithms are able to exceed local accuracy and achieve comparable accuracy to central training. Additionally, we show that applying DP to KDbased FL significantly damages its utility, leading to up to 70% accuracy loss for a privacy budget ϵ10\epsilon \leq 10 .




Deep Learning-Based Throughput Prediction in 5G Cellular Networks

July 2024

·

78 Reads

·

2 Citations

5G technology has ushered in a new era of cellular networks characterized by unprecedented speeds and connectivity. However, these networks' dynamic and complex nature presents significant challenges in network management and Quality of Service (QoS) assurance. In this context, accurate throughput prediction is essential for optimizing network resources, improving traffic management, and enhancing user experiences. This study presents novel deep learning approaches utilizing Long Short-Term Memory (LSTM), Bi-directional LSTM (BiLSTM), and Artificial Neural Networks (ANN) to predict the throughput. The methodology achieves exceptional performance, surpassing existing methods. The motive behind leveraging deep learning algorithms is their exceptional ability to capture temporal dependencies and patterns within time-series data, which is intrinsic to network traffic. By employing these models, we can forecast network throughput with high precision, facilitating proactive resource allocation and congestion avoidance. Our approach maintains high QoS and supports cost efficiency and adaptive network maintenance. The BiLSTM and LSTM model's adaptability and learning capabilities make it well-suited for the ever-evolving 5G landscape, where user demands and network conditions fluctuate rapidly. This study demonstrates the technical feasibility and benefits of using BiLSTM and LSTM for overall throughput prediction. It highlights the broader implications for the future of 5G network management and optimization.




Fig. 1: Number of data points for each attack.
A Robust Federated Learning Approach for Combating Attacks Against IoT Systems Under Non-IID Challenges

May 2024

·

41 Reads

·

1 Citation

In the context of the growing proliferation of user devices and the concurrent surge in data volumes, the complexities arising from the substantial increase in data have posed formidable challenges to conventional machine learning model training. Particularly, this is evident within resource-constrained and security-sensitive environments such as those encountered in networks associated with the Internet of Things (IoT). Federated Learning has emerged as a promising remedy to these challenges by decentralizing model training to edge devices or parties, effectively addressing privacy concerns and resource limitations. Nevertheless, the presence of statistical heterogeneity in non-Independently and Identically Distributed (non-IID) data across different parties poses a significant hurdle to the effectiveness of FL. Many FL approaches have been proposed to enhance learning effectiveness under statistical heterogeneity. However, prior studies have uncovered a gap in the existing research land-scape, particularly in the absence of a comprehensive comparison between federated methods addressing statistical heterogeneity in detecting IoT attacks. In this research endeavor, we delve into the exploration of FL algorithms, specifically FedAvg, FedProx, and Scaffold, under different data distributions. Our focus is on achieving a comprehensive understanding of and addressing the challenges posed by statistical heterogeneity. In this study, We classify large-scale IoT attacks by utilizing the CICIoT2023dataset. Through meticulous analysis and experimentation, our objective is to illuminate the performance nuances of these FL methods, providing valuable insights for researchers and practitioners in the domain.


Citations (68)


... We consider two layouts of an office room widely used in the literature [10]- [12], denoted as R1 and R2. The room's dimensions are 5m×5m×3m. ...

Reference:

Deep Learning-based Physical Layer Authentication in LiFi Networks Under Multi - User Mobility
Concept Drift Aware Wireless Key Generation in Dynamic LiFi Networks

IEEE Open Journal of the Communications Society

... We review data-driven privacy techniques such as differential privacy, homomorphic encryption, secure multiparty computation, and FL, mapping them to emerging challenges in network security. It reviews the open research questions and presents solutions to thse challenges and opportunities for AI-enabled networks of the future [27]. ...

Privacy-Preserving Data-Driven Learning Models for Emerging Communication Networks: A Comprehensive Survey
  • Citing Article
  • January 2024

IEEE Communications Surveys & Tutorials

... In this study, we compare FedSGAN with several significant related works, including FedAvg [7], FedProx [32], SCAFFOLD [33], FedFTG [28], FedGen [34], FedRand [35], FedKD [36], and f-differential [37]. Table 1 outlines the features of these state-of-the-art methods and demonstrates that FedGen and FedFTG utilize KD to address the Non-IID challenge. ...

Communication-Efficient and Privacy-Preserving Federated Learning Via Joint Knowledge Distillation and Differential Privacy in Bandwidth-Constrained Networks
  • Citing Article
  • November 2024

IEEE Transactions on Vehicular Technology

... Previous studies have used various machine learning methods for diabetes detection, such as Random Forest, SVM, and artificial neural networks, with Random Forest often showing the best performance. Research by [6] performed neural network optimization for diabetes calcification. This study obtained good results above 80 percent. ...

Optimized Neural Networks for Diabetes Classification Using Pima Indians Diabetes Database

... The most commonly used sampling frequencies are 1000Hz (26 papers) and 250Hz (16 papers), and the median across all studies was 600Hz. Category Subcategory Study Classification Decoding [18], [19], [20], [21], [22], [23], [24], [25], [26], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], [38], [39], [40], [41], [42], [43], [44], [45] BCI [46], [47], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57], [58], [59] Clinical [60], [61], [62], [63], [64], [65], [66], [67], [68], [69], [70], [71], [72], [73], [74], [75], [76] Event detection [77], [78], [79], [80], [81], [82], [83], [84], [85][86] Modeling ...

Data-Driven Model for Improving MEG Epileptic Spike Detection

... Their goal was to minimize end-to-end latency and address service interruptions caused by overloaded nodes, link failures, and VNF instance failures. The authors of [5] introduced a framework that uses Convolutional Neural Networks (CNNs) and Artificial Neural Networks (ANNs) to determine the optimal migration paths for VNFs. Their aim was to minimize migration time and cost. ...

Optimizing VNF Migration in B5G Core Networks: A Machine Learning Approach
  • Citing Conference Paper
  • May 2024

... The results show that RNNs perform better than these conventional models [19]. In addition to RNNs, other neural network algorithms, such as Long Short-Term Memory (LSTM) [20] and a combination of LSTM with Bidirectional LSTM (BiLSTM), have also been used for throughput prediction in 5G networks [21]. Besides deep learning algorithms, other methods, such as ARIMA [22] and a combination of neural networks with ARIMA [23], have also been applied in centralized learning approaches. ...

Deep Learning-Based Throughput Prediction in 5G Cellular Networks
  • Citing Conference Paper
  • July 2024

... Additionally, classification is performed using algorithms like Random Forest, Support Vector Machine (SVM), K-Nearest Neighbour (KNN) and Decision Tree. Antora Dev et al. 11 introduced hybrid deep learning models designed for malaria detection, emphasizing the use of cascading RNN classifiers. The CNN-LSTM-BiLSTM model achieved 96.20% accuracy, while CNN-BiLSTM-GRU minimized type-II errors. ...

Advancing Malaria Identification From Microscopic Blood Smears Using Hybrid Deep Learning Frameworks

IEEE Access

... In [39], an adversarial autoencoder is introduced for WSKG while preventing key leakage. In our previous work [40], we explored foundational techniques related to this study, which have been further developed and expanded in the current paper. ...

Robust Deep Learning-Based Secret Key Generation in Dynamic LiFi Networks Against Concept Drift

... In order to aggregate clients' models, a global architecture f is imposed on all clients. Knowledge Distillation-based FL offers an alternative model-agnostic approach in which all clients share a public dataset D p on which they calculate local Soft Labels (SL k ) [26], [27]. These local Soft Labels are then transmitted to the server to be aggregated into SL r , which is broadcasted to all clients to train on it in addition to the local training. ...

Joint Knowledge Distillation and Local Differential Privacy for Communication-Efficient Federated Learning in Heterogeneous Systems
  • Citing Conference Paper
  • December 2023