E. Veronica Belmega

ORCID: 0000-0003-4336-4704
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced MIMO Systems Optimization
  • Cooperative Communication and Network Coding
  • Wireless Communication Security Techniques
  • Advanced Wireless Network Optimization
  • Energy Harvesting in Wireless Networks
  • Cognitive Radio Networks and Spectrum Sensing
  • Advanced Wireless Communication Technologies
  • Wireless Communication Networks Research
  • Advanced Bandit Algorithms Research
  • Smart Grid Security and Resilience
  • Game Theory and Applications
  • Full-Duplex Wireless Communications
  • Millimeter-Wave Propagation and Modeling
  • Network Security and Intrusion Detection
  • ICT Impact and Policies
  • Advanced Wireless Communication Techniques
  • GNSS positioning and interference
  • Security in Wireless Sensor Networks
  • Microwave Engineering and Waveguides
  • Smart Grid Energy Management
  • Stochastic Gradient Optimization Techniques
  • Chaos-based Image/Signal Encryption
  • Indoor and Outdoor Localization Technologies
  • Network Traffic and Congestion Control
  • Wireless Networks and Protocols

Equipes Traitement de l'Information et Systèmes
2015-2024

Centre National de la Recherche Scientifique
2014-2024

Université Gustave Eiffel
2022-2024

CY Cergy Paris Université
2014-2024

École Nationale Supérieure de l'Électronique et de ses Applications
2014-2024

Laboratoire d'Informatique Gaspard-Monge
2022-2024

Université Paris-Seine
2019-2020

Laboratoire d'Informatique de Grenoble
2016-2017

Institut national de recherche en informatique et en automatique
2016

Princeton University
2011-2012

The problem of energy-efficient precoding is investigated when the terminals in system are equipped with multiple antennas. Considering static and fast-fading multiple-input multiple-output (MIMO) channels, energy-efficiency defined as transmission rate to power ratio shown be maximized at low transmit power. most interesting case one slow fading MIMO channels. For this type optimal scheme generally not trivial. Furthermore, using all available always sense (which, case, corresponds...

10.1109/tsp.2010.2086451 article EN IEEE Transactions on Signal Processing 2010-10-19

We analyze the power allocation problem for orthogonal multiple access channels by means of a non-cooperative potential game in which each user distributes his over available to him. When are static, we show that this possesses unique equilibrium; moreover, if network's users follow distributed learning scheme based on replicator dynamics evolutionary theory, then they converge equilibrium exponentially fast. On other hand, fluctuate stochastically time, associated still admits equilibrium,...

10.1109/jsac.2012.120109 article EN IEEE Journal on Selected Areas in Communications 2012-01-01

This work proposes a distributed power allocation scheme for maximizing energy efficiency in the uplink of orthogonal frequency-division multiple access (OFDMA)-based heterogeneous networks (HetNets). The user equipment (UEs) network are modeled as rational agents that engage non-cooperative game where each UE allocates its available transmit over set assigned subcarriers so to maximize individual utility (defined user's throughput per Watt power) subject minimum-rate constraints. In this...

10.1109/twc.2015.2425397 article EN IEEE Transactions on Wireless Communications 2015-04-22

This work proposes a moving target defense (MTD) strategy to detect coordinated cyber-physical attacks (CCPAs) against power grids. The main idea of the proposed approach is invalidate knowledge that attackers use mask effects their physical attack by actively perturbing grid's transmission line reactances via distributed flexible AC system (D-FACTS) devices. MTD design consists two parts. First, we identify subset links for D-FACTS device deployment enables defender CCPAs any link in...

10.1109/tsg.2021.3095083 article EN publisher-specific-oa IEEE Transactions on Smart Grid 2021-07-06

A game theoretic approach is used to derive the optimal decentralized power allocation (PA) in fast fading multiple access channels where transmitters and receiver are equipped with antennas.The players (the mobile terminals) free choose their PA order maximize individual transmission rates (in particular they can ignore some specified centralized policies).A simple coordination mechanism between users introduced.The nature influence of this studied detail.The signal indicates which applies...

10.1109/twc.2009.081182 article EN IEEE Transactions on Wireless Communications 2009-06-01

In this paper, we examine the maximization of energy efficiency (EE) in next-generation multiuser MIMO-OFDM networks that vary dynamically over time-e.g., due to user mobility, fluctuations wireless medium, modulations users' load, etc. Contrary static/stationary regime, system may evolve an arbitrary manner, so users must adjust "on fly," without being able predict state advance. To tackle these issues, propose a simple and distributed online optimization policy leads no regret, i.e., it...

10.1109/jsac.2016.2544600 article EN IEEE Journal on Selected Areas in Communications 2016-03-21

Spurred by the enthusiasm surrounding "Big Data" paradigm, mathematical and algorithmic tools of online optimization have found widespread use in problems where trade-off between data exploration exploitation plays a predominant role. This is particular importance to several branches applications signal processing, such as mining, statistical inference, multimedia indexing wireless communications (to name but few). With this mind, aim tutorial paper provide gentle introduction learning...

10.48550/arxiv.1804.04529 preprint EN other-oa arXiv (Cornell University) 2018-01-01

mmWave communication requires accurate and continuous beam steering to overcome the severe propagation loss user mobility. In this paper, we leverage a self-supervised deep learning approach exploit sub-6 GHz channels propose novel method predict beamforming vectors in band for single access point– link. This complex channel-beam mapping is learned via data issued from DeepMIMO dataset. We then compare our proposed with existing supervised classic reinforcement methods. Our simulations show...

10.1109/twc.2022.3170104 article EN IEEE Transactions on Wireless Communications 2022-05-05

In this paper, we investigate a distributed learning scheme for broad class of stochastic optimization problems and games that arise in signal processing wireless communications. The proposed algorithm relies on the method matrix exponential (MXL) only requires locally computable gradient observations are possibly imperfect and/or obsolete. To analyze it, introduce notion stable Nash equilibrium show is globally convergent to such equilibria - or when an stable. We also derive explicit...

10.1109/tsp.2017.2656847 article EN IEEE Transactions on Signal Processing 2017-01-23

Jamming attacks represent a critical vulnerability for wireless secret key generation (SKG) systems. In this paper, two counter-jamming approaches are investigated SKG systems: first, the employment of energy harvesting (EH) at legitimate nodes to turn part jamming power into useful communication power, and, second, use channel hopping or spreading in block fading channels reduce impact jamming. both cases, adversarial interaction between pair and jammer is formulated as two-player zero-sum...

10.1109/tifs.2017.2713342 article EN IEEE Transactions on Information Forensics and Security 2017-06-07

This work proposes a moving target defense (MTD) strategy to detect coordinated cyber-physical attacks (CCPAs) against power grids. A CCPA consists of physical attack, such as disconnecting transmission line, followed by cyber attack that injects false data into the sensor measurements mask effects attack. Such can lead undetectable line outages and cause significant damage grid. The main idea proposed approach is invalidate knowledge attackers use actively perturbing grid's reactances using...

10.1109/smartgridcomm.2019.8909767 preprint EN 2019-10-01

In this paper, we examine cognitive radio systems that evolve dynamically over time due to changing user and environmental conditions. To combine the advantages of orthogonal frequency division multiplexing (OFDM) multiple-input, multiple-output (MIMO) technologies, consider a MIMO-OFDM network where wireless users with multiple antennas communicate several non-interfering bands. As network's primary (PUs) come go in system, communication environment changes constantly (and, many cases,...

10.1109/jsac.2014.141104 article EN IEEE Journal on Selected Areas in Communications 2014-11-01

The use of energy harvesting as a counter-jamming measure is investigated on the premise that part harmful interference can be harvested to increase transmit power. We formulate strategic interaction between pair legitimate nodes and malicious jammer zero-sum game. Our analysis demonstrates are able neutralize jammer. However, this policy not necessarily Nash equilibrium hence sub-optimal. Instead, jamming lead relative gains up 95%, average, in terms Shannon capacity, when high.

10.1109/lwc.2018.2871152 article EN IEEE Wireless Communications Letters 2018-09-19

In this paper, we review the literature on physical layer energy-efficient communications. The most relevant and recent works are mainly centered around two frameworks: pragmatic information theoretical approaches. Both of them aim at finding best transmit and/or receive policies which maximize number bits that can be reliably conveyed over channel per unit energy consumed. Taking into account both approaches, analysis starts with single user SISO (single-input single-output) channel, is...

10.1109/pimrcw.2010.5670381 preprint EN 2010-09-01

In this paper, we investigate the energy efficiency of a multi-user downlink non-orthogonal multiple access (NOMA) system aided by an ambient backscatter device that modulates its own information reflecting incident signal coming from NOMA transmitter. Because multiplicative operation at when transmitter's signal, achievable sum rate is not known. Hence, first derive information-theoretic region for discrete memoryless channel and, subsequently, Gaussian channels. We then propose joint...

10.1109/tgcn.2023.3261499 article EN IEEE Transactions on Green Communications and Networking 2023-03-24

We model the interaction of several radio devices aiming to obtain wireless connectivity by using a set base stations (BS) as non-cooperative game. Each device aims maximize its own spectral efficiency (SE) in two different scenarios: First, we let each player use unique BS (BS se

10.4108/icst.valuetools2009.7778 preprint EN 2009-01-01

We analyze the problem of finding optimal signal covariance matrix for multiple-input multiple-output (MIMO) multiple access channels by using an approach based on "ex-ponential learning", a novel optimization method which applies more generally to (quasi-)convex problems defined over sets positive-definite matrices (with or without trace constraints). If are static, system users converge power allocation profile attains sum capacity channel exponentially fast (in practice, within few...

10.1109/isit.2012.6284117 preprint EN 2012-07-01

In this paper, a novel game-theoretic model of the complex interactions between network service providers (NSPs) and users in heterogeneous small-cell networks is investigated. game, NSPs selfishly aim at maximizing their profit while, simultaneously, seek to optimize chosen service's quality-price tradeoff. A Stackelberg formulation which act as leaders followers proposed. The users' are modeled general nonatomic game. existence Wardrop equilibrium (WE) game proven, its expression solution...

10.1109/twc.2014.2326678 article EN IEEE Transactions on Wireless Communications 2014-05-23

Wireless secret key generation (W-SKG) from shared randomness (e.g., the wireless channel fading realizations), is a well established scheme that can be used for session agreement. W-SKG approaches of particular interest in delay constrained networks and notably context ultra reliable low latency communications (URLLC) beyond fifth (B5G) systems. However W- SKG schemes are known to malleable over so called "advantage distillation" phase, during which observations obtained at legitimate...

10.1109/globecom38437.2019.9013816 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2019-12-01

Lightweight session key agreement schemes are expected to play a central role in building Internet of things (IoT) security sixth-generation (6G) networks. A well-established approach deriving from the physical layer is secret generation (SKG) shared randomness (in form wireless fading coefficients). However, although practical, SKG have been shown be vulnerable active attacks over initial “advantage distillation” phase, throughout which estimates coefficients obtained at legitimate users....

10.3390/e23080960 article EN cc-by Entropy 2021-07-27

In this note we generalize the trace inequality derived by [1] to case where number of terms sum (denoted K) is arbitrary.

10.48550/arxiv.1011.6324 preprint EN other-oa arXiv (Cornell University) 2010-01-01

Future cellular networks are facing crucial architecture changes to cope with high throughput, energy and cost-efficiency demands. Emerging solutions small-cells femto-cells which will coexist classical macro-cells technology. In these heterogeneous networks, we study the joint service pricing bandwidth allocation problem at operator level. Each user selfishly adopts that optimizes its satisfaction. The user-level is formulated as a general non-atomic game. Wardrop equilibrium proven exist...

10.1109/acssc.2011.6190295 preprint EN 2011-11-01

In this work, we derive a distributed power control algorithm for energy-efficientuplink transmissions in interference-limited cellular networks, equipped with either multiple or shared relays. The proposed solution is derived by modeling the mobile terminals as utility-driven rational agents that engage noncooperative game, under minimum-rate constraints. theoretical analysis of game equilibrium used to compare performance two different architectures. Extensive simulations show relay...

10.1109/icassp.2014.6854960 preprint EN 2014-05-01

To exploit the large bandwidth available in millimeter wave spectrum, highly directional beams need to be employed compensate for severe pathloss incurred at high frequencies. As a result, of both transmitter and receiver must constantly aligned. In this paper, beam alignment (BA) problem is formulated as an adversarial multi-armed bandit (MAB) problem, yielding distributed BA search between receiver. First, we analyze optimal codebook size that reduces space while insuring good performance...

10.1145/3306309.3306315 preprint EN 2019-02-25
Coming Soon ...