- Advanced MIMO Systems Optimization
- Cooperative Communication and Network Coding
- Wireless Communication Security Techniques
- Advanced Wireless Network Optimization
- Energy Harvesting in Wireless Networks
- Cognitive Radio Networks and Spectrum Sensing
- Advanced Wireless Communication Technologies
- Wireless Communication Networks Research
- Advanced Bandit Algorithms Research
- Smart Grid Security and Resilience
- Game Theory and Applications
- Full-Duplex Wireless Communications
- Millimeter-Wave Propagation and Modeling
- Network Security and Intrusion Detection
- ICT Impact and Policies
- Advanced Wireless Communication Techniques
- GNSS positioning and interference
- Security in Wireless Sensor Networks
- Microwave Engineering and Waveguides
- Smart Grid Energy Management
- Stochastic Gradient Optimization Techniques
- Chaos-based Image/Signal Encryption
- Indoor and Outdoor Localization Technologies
- Network Traffic and Congestion Control
- Wireless Networks and Protocols
Equipes Traitement de l'Information et Systèmes
2015-2024
Centre National de la Recherche Scientifique
2014-2024
Université Gustave Eiffel
2022-2024
CY Cergy Paris Université
2014-2024
École Nationale Supérieure de l'Électronique et de ses Applications
2014-2024
Laboratoire d'Informatique Gaspard-Monge
2022-2024
Université Paris-Seine
2019-2020
Laboratoire d'Informatique de Grenoble
2016-2017
Institut national de recherche en informatique et en automatique
2016
Princeton University
2011-2012
The problem of energy-efficient precoding is investigated when the terminals in system are equipped with multiple antennas. Considering static and fast-fading multiple-input multiple-output (MIMO) channels, energy-efficiency defined as transmission rate to power ratio shown be maximized at low transmit power. most interesting case one slow fading MIMO channels. For this type optimal scheme generally not trivial. Furthermore, using all available always sense (which, case, corresponds...
We analyze the power allocation problem for orthogonal multiple access channels by means of a non-cooperative potential game in which each user distributes his over available to him. When are static, we show that this possesses unique equilibrium; moreover, if network's users follow distributed learning scheme based on replicator dynamics evolutionary theory, then they converge equilibrium exponentially fast. On other hand, fluctuate stochastically time, associated still admits equilibrium,...
This work proposes a distributed power allocation scheme for maximizing energy efficiency in the uplink of orthogonal frequency-division multiple access (OFDMA)-based heterogeneous networks (HetNets). The user equipment (UEs) network are modeled as rational agents that engage non-cooperative game where each UE allocates its available transmit over set assigned subcarriers so to maximize individual utility (defined user's throughput per Watt power) subject minimum-rate constraints. In this...
This work proposes a moving target defense (MTD) strategy to detect coordinated cyber-physical attacks (CCPAs) against power grids. The main idea of the proposed approach is invalidate knowledge that attackers use mask effects their physical attack by actively perturbing grid's transmission line reactances via distributed flexible AC system (D-FACTS) devices. MTD design consists two parts. First, we identify subset links for D-FACTS device deployment enables defender CCPAs any link in...
A game theoretic approach is used to derive the optimal decentralized power allocation (PA) in fast fading multiple access channels where transmitters and receiver are equipped with antennas.The players (the mobile terminals) free choose their PA order maximize individual transmission rates (in particular they can ignore some specified centralized policies).A simple coordination mechanism between users introduced.The nature influence of this studied detail.The signal indicates which applies...
In this paper, we examine the maximization of energy efficiency (EE) in next-generation multiuser MIMO-OFDM networks that vary dynamically over time-e.g., due to user mobility, fluctuations wireless medium, modulations users' load, etc. Contrary static/stationary regime, system may evolve an arbitrary manner, so users must adjust "on fly," without being able predict state advance. To tackle these issues, propose a simple and distributed online optimization policy leads no regret, i.e., it...
Spurred by the enthusiasm surrounding "Big Data" paradigm, mathematical and algorithmic tools of online optimization have found widespread use in problems where trade-off between data exploration exploitation plays a predominant role. This is particular importance to several branches applications signal processing, such as mining, statistical inference, multimedia indexing wireless communications (to name but few). With this mind, aim tutorial paper provide gentle introduction learning...
mmWave communication requires accurate and continuous beam steering to overcome the severe propagation loss user mobility. In this paper, we leverage a self-supervised deep learning approach exploit sub-6 GHz channels propose novel method predict beamforming vectors in band for single access point– link. This complex channel-beam mapping is learned via data issued from DeepMIMO dataset. We then compare our proposed with existing supervised classic reinforcement methods. Our simulations show...
In this paper, we investigate a distributed learning scheme for broad class of stochastic optimization problems and games that arise in signal processing wireless communications. The proposed algorithm relies on the method matrix exponential (MXL) only requires locally computable gradient observations are possibly imperfect and/or obsolete. To analyze it, introduce notion stable Nash equilibrium show is globally convergent to such equilibria - or when an stable. We also derive explicit...
Jamming attacks represent a critical vulnerability for wireless secret key generation (SKG) systems. In this paper, two counter-jamming approaches are investigated SKG systems: first, the employment of energy harvesting (EH) at legitimate nodes to turn part jamming power into useful communication power, and, second, use channel hopping or spreading in block fading channels reduce impact jamming. both cases, adversarial interaction between pair and jammer is formulated as two-player zero-sum...
This work proposes a moving target defense (MTD) strategy to detect coordinated cyber-physical attacks (CCPAs) against power grids. A CCPA consists of physical attack, such as disconnecting transmission line, followed by cyber attack that injects false data into the sensor measurements mask effects attack. Such can lead undetectable line outages and cause significant damage grid. The main idea proposed approach is invalidate knowledge attackers use actively perturbing grid's reactances using...
In this paper, we examine cognitive radio systems that evolve dynamically over time due to changing user and environmental conditions. To combine the advantages of orthogonal frequency division multiplexing (OFDM) multiple-input, multiple-output (MIMO) technologies, consider a MIMO-OFDM network where wireless users with multiple antennas communicate several non-interfering bands. As network's primary (PUs) come go in system, communication environment changes constantly (and, many cases,...
The use of energy harvesting as a counter-jamming measure is investigated on the premise that part harmful interference can be harvested to increase transmit power. We formulate strategic interaction between pair legitimate nodes and malicious jammer zero-sum game. Our analysis demonstrates are able neutralize jammer. However, this policy not necessarily Nash equilibrium hence sub-optimal. Instead, jamming lead relative gains up 95%, average, in terms Shannon capacity, when high.
In this paper, we review the literature on physical layer energy-efficient communications. The most relevant and recent works are mainly centered around two frameworks: pragmatic information theoretical approaches. Both of them aim at finding best transmit and/or receive policies which maximize number bits that can be reliably conveyed over channel per unit energy consumed. Taking into account both approaches, analysis starts with single user SISO (single-input single-output) channel, is...
In this paper, we investigate the energy efficiency of a multi-user downlink non-orthogonal multiple access (NOMA) system aided by an ambient backscatter device that modulates its own information reflecting incident signal coming from NOMA transmitter. Because multiplicative operation at when transmitter's signal, achievable sum rate is not known. Hence, first derive information-theoretic region for discrete memoryless channel and, subsequently, Gaussian channels. We then propose joint...
We model the interaction of several radio devices aiming to obtain wireless connectivity by using a set base stations (BS) as non-cooperative game. Each device aims maximize its own spectral efficiency (SE) in two different scenarios: First, we let each player use unique BS (BS se
We analyze the problem of finding optimal signal covariance matrix for multiple-input multiple-output (MIMO) multiple access channels by using an approach based on "ex-ponential learning", a novel optimization method which applies more generally to (quasi-)convex problems defined over sets positive-definite matrices (with or without trace constraints). If are static, system users converge power allocation profile attains sum capacity channel exponentially fast (in practice, within few...
In this paper, a novel game-theoretic model of the complex interactions between network service providers (NSPs) and users in heterogeneous small-cell networks is investigated. game, NSPs selfishly aim at maximizing their profit while, simultaneously, seek to optimize chosen service's quality-price tradeoff. A Stackelberg formulation which act as leaders followers proposed. The users' are modeled general nonatomic game. existence Wardrop equilibrium (WE) game proven, its expression solution...
Wireless secret key generation (W-SKG) from shared randomness (e.g., the wireless channel fading realizations), is a well established scheme that can be used for session agreement. W-SKG approaches of particular interest in delay constrained networks and notably context ultra reliable low latency communications (URLLC) beyond fifth (B5G) systems. However W- SKG schemes are known to malleable over so called "advantage distillation" phase, during which observations obtained at legitimate...
Lightweight session key agreement schemes are expected to play a central role in building Internet of things (IoT) security sixth-generation (6G) networks. A well-established approach deriving from the physical layer is secret generation (SKG) shared randomness (in form wireless fading coefficients). However, although practical, SKG have been shown be vulnerable active attacks over initial “advantage distillation” phase, throughout which estimates coefficients obtained at legitimate users....
In this note we generalize the trace inequality derived by [1] to case where number of terms sum (denoted K) is arbitrary.
Future cellular networks are facing crucial architecture changes to cope with high throughput, energy and cost-efficiency demands. Emerging solutions small-cells femto-cells which will coexist classical macro-cells technology. In these heterogeneous networks, we study the joint service pricing bandwidth allocation problem at operator level. Each user selfishly adopts that optimizes its satisfaction. The user-level is formulated as a general non-atomic game. Wardrop equilibrium proven exist...
In this work, we derive a distributed power control algorithm for energy-efficientuplink transmissions in interference-limited cellular networks, equipped with either multiple or shared relays. The proposed solution is derived by modeling the mobile terminals as utility-driven rational agents that engage noncooperative game, under minimum-rate constraints. theoretical analysis of game equilibrium used to compare performance two different architectures. Extensive simulations show relay...
To exploit the large bandwidth available in millimeter wave spectrum, highly directional beams need to be employed compensate for severe pathloss incurred at high frequencies. As a result, of both transmitter and receiver must constantly aligned. In this paper, beam alignment (BA) problem is formulated as an adversarial multi-armed bandit (MAB) problem, yielding distributed BA search between receiver. First, we analyze optimal codebook size that reduces space while insuring good performance...