Mid Sweden University

miun.sePublications
Change search
Link to record
Permanent link

Direct link
Publications (7 of 7) Show all publications
Talebian, H., Mahmood, A., Nikonowicz, J., Thar, K. & Gidlund, M. (2024). An Ensemble ML Model Design to Classify LOS/NLOS in 5G-NR InF Propagation Environment. In: Proceedings GLOBECOM 2024: . Paper presented at IEEE Global Communications Conference, Cape Town, South Africa, Dec. 2024.
Open this publication in new window or tab >>An Ensemble ML Model Design to Classify LOS/NLOS in 5G-NR InF Propagation Environment
Show others...
2024 (English)In: Proceedings GLOBECOM 2024, 2024Conference paper, Published paper (Refereed)
National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:miun:diva-53853 (URN)
Conference
IEEE Global Communications Conference, Cape Town, South Africa, Dec. 2024
Available from: 2025-02-21 Created: 2025-02-21 Last updated: 2025-02-21Bibliographically approved
Zhang, J., Zheng, T., Lu, B., Yin, H., Thar, K., Gidlund, M. & Guizani, M. (2024). Enhancing Training Efficiency for Cloud-Edge Collaboration in the Industrial Internet of Things: A Transmission-Centric Approach. In: 2024 IEEE 22nd International Conference on Industrial Informatics (INDIN): . Paper presented at IEEE International Conference on Industrial Informatics (INDIN). IEEE conference proceedings
Open this publication in new window or tab >>Enhancing Training Efficiency for Cloud-Edge Collaboration in the Industrial Internet of Things: A Transmission-Centric Approach
Show others...
2024 (English)In: 2024 IEEE 22nd International Conference on Industrial Informatics (INDIN), IEEE conference proceedings, 2024Conference paper, Published paper (Refereed)
Abstract [en]

With the development of intelligent edge computing (IEC) in industrial IoT (IIoT), there is a growing number of service providers trying to leverage computing resources in the cloud and at the edge to meet the users’ demand for low latency and high reliability in diversified applications. This evolving landscape necessitates innovative approaches to manage and process the vast amounts of data generated by IIoT devices. Among these approaches, distributed learning frameworks, such as federated learning (FL), have emerged as popular solutions. However, compared to computing, communication remains the primary bottleneck that constrains the speed of federated model training. Most of the previous solutions have focused on reducing communication overhead. Differently, we propose a transmission-centric approach by designing an efficient communication architecture for FL with cloud-edge collaboration, specifically aimed at enhancing communication capabilities through multi-path transmission. We deploy this FL system in a real environment and conduct extensive testing. The results demonstrate that the new approach can significantly reduce communication time in FL setting, thereby enhancing model aggregation efficiency and shortening the overall training duration. Compared to conventional single-path transmission, the proposed solution improves training efficiency by up to 26.4%. 

Place, publisher, year, edition, pages
IEEE conference proceedings, 2024
Keywords
communication efficiency, federated learning, intelligent edge computing, multi-path transmission
National Category
Computer Sciences
Identifiers
urn:nbn:se:miun:diva-53686 (URN)10.1109/INDIN58382.2024.10774270 (DOI)2-s2.0-85215517750 (Scopus ID)9798331527471 (ISBN)
Conference
IEEE International Conference on Industrial Informatics (INDIN)
Available from: 2025-01-28 Created: 2025-01-28 Last updated: 2025-01-28Bibliographically approved
Ericson, A., Forsström, S. & Thar, K. (2024). IIoT Intrusion Detection using Lightweight Deep Learning Models on Edge Devices. In: 2024 IEEE 20th International Conference on Factory Communication Systems (WFCS): . Paper presented at IEEE 20th International Conference on Factory Communication Systems (WFCS), Toulouse, April 17-19, 2024. IEEE conference proceedings
Open this publication in new window or tab >>IIoT Intrusion Detection using Lightweight Deep Learning Models on Edge Devices
2024 (English)In: 2024 IEEE 20th International Conference on Factory Communication Systems (WFCS), IEEE conference proceedings, 2024Conference paper, Published paper (Refereed)
Abstract [en]

In the rapidly evolving cybersecurity landscape, detecting and preventing network attacks has become crucial within the industrial sector. This study aims to explore the potential of intrusion detection by employing deep learning within edge computing, especially for the Industrial Internet of Things. Specifically, TinyML converted CNN, LSTM, Transformer-LSTM, and GCN models on the UNSW-NB15 dataset. A comprehensive dataset analysis gained insights into the nature of attack behavior data. Subsequently, a comparative analysis in an edge computing setup using Raspberry Pi units revealed that the GCN model, with its accuracy of 97.5%, was the best suited of the compared models for this application. However, the study also explored variables like time consumption, where the CNN model was the fastest out of the compared models. This research also highlights the need for continued exploration, especially in addressing dataset imbalances and enhancing model generalizability. By recognizing each model's strengths and areas of improvement, this research serves as a step toward bolstering digital safety and security in an increasingly interconnected industrial world.

Place, publisher, year, edition, pages
IEEE conference proceedings, 2024
National Category
Computer Engineering
Identifiers
urn:nbn:se:miun:diva-51534 (URN)10.1109/wfcs60972.2024.10540991 (DOI)2-s2.0-85195372403 (Scopus ID)979-8-3503-1934-7 (ISBN)
Conference
IEEE 20th International Conference on Factory Communication Systems (WFCS), Toulouse, April 17-19, 2024
Available from: 2024-06-17 Created: 2024-06-17 Last updated: 2024-06-18Bibliographically approved
Liu, B., Zheng, T., Thar, K., Gidlund, M., Ma, X., Lei, B., . . . Guizani, M. (2024). Intelligent Traffic-Service Mapping of Network for Advanced Industrial IoT Edge Computing. In: IEEE International Workshop on Factory Communication Systems - Proceedings, WFCS: . Paper presented at 20th IEEE International Conference on Factory Communication Systems, WFCS 2024. IEEE conference proceedings
Open this publication in new window or tab >>Intelligent Traffic-Service Mapping of Network for Advanced Industrial IoT Edge Computing
Show others...
2024 (English)In: IEEE International Workshop on Factory Communication Systems - Proceedings, WFCS, IEEE conference proceedings, 2024Conference paper, Published paper (Refereed)
Abstract [en]

The increasing number of IoT devices in the network brings new challenges to the network carrying capacity of intelligent edge computing, and the complicated network services make the demand for network resources in industrial production scenarios or ordinary network users often exceed the carrying capacity of the edge computing network. To alleviate this problem, this paper proposes an intelligent edge computing architecture that introduces network service identification, extracts and analyses the data characteristics of network traffic, and designs appropriate algorithms to classify network traffic into six different service types. This enables real-time and computing-requiring tasks to be prioritised in the network. Using two machine learning algorithms, KNN and MLP, a model validation is carried out on the constructed dataset, and the results show the effectiveness of the method, with the correct rate of data validation reaching 85%, which is more than 5% higher than the correct rate of direct classification of the specified applications, and the accuracy can be as high as 97% in certain scenarios. 

Place, publisher, year, edition, pages
IEEE conference proceedings, 2024
Keywords
Explainable AI, Intelligent edge computing, Machine learning, Network service perception
National Category
Computer Sciences
Identifiers
urn:nbn:se:miun:diva-51553 (URN)10.1109/WFCS60972.2024.10540782 (DOI)2-s2.0-85195399140 (Scopus ID)9798350319347 (ISBN)
Conference
20th IEEE International Conference on Factory Communication Systems, WFCS 2024
Available from: 2024-06-18 Created: 2024-06-18 Last updated: 2024-06-18Bibliographically approved
Chmieliauskas, D., Mahmood, A., Paulikas, S., Thar, K. & Gidlund, M. (2023). Q-Learning Inspired Method for Antenna Azimuth Selection in Cellular Networks. In: 2023 Workshop on Microwave Theory and Technology in Wireless Communications (MTTW): . Paper presented at 2023 Workshop on Microwave Theory and Technology in Wireless Communications (MTTW).. IEEE conference proceedings
Open this publication in new window or tab >>Q-Learning Inspired Method for Antenna Azimuth Selection in Cellular Networks
Show others...
2023 (English)In: 2023 Workshop on Microwave Theory and Technology in Wireless Communications (MTTW), IEEE conference proceedings, 2023Conference paper, Published paper (Refereed)
Abstract [en]

Cellular networks are becoming increasingly complex, requiring careful optimization of parameters such as antenna propagation pattern, tilt, direction, height, and transmitted reference signal power to ensure a high-quality user experience. In this paper, we propose a new method to optimize antenna direction in a cellular network using Q-learning. Our approach involves utilizing the open-source quasi-deterministic radio channel generator to generate radio frequency (RF) power maps for various antenna configurations. We then implement a Q-learning algorithm to learn the optimal antenna directions that maximize the signal-to-interference-plus-noise ratio (SINR) across the coverage area. The learning process takes place in the constructed open-source OpenAI Gym environment associated with the antenna configuration. Our tests demonstrate that the proposed Q-learning-based method outperforms random exhaustive search methods and can effectively improve the performance of cellular networks while enhancing the quality of experience (QoE) for end users.

Place, publisher, year, edition, pages
IEEE conference proceedings, 2023
Keywords
Wireless Communications, Wireless System Architecture, Propagation Channel Modeling, 5G, 6G
National Category
Communication Systems Telecommunications
Identifiers
urn:nbn:se:miun:diva-49469 (URN)10.1109/MTTW59774.2023.10320055 (DOI)2-s2.0-85179550256 (Scopus ID)979-8-3503-9349-1 (ISBN)
Conference
2023 Workshop on Microwave Theory and Technology in Wireless Communications (MTTW).
Available from: 2023-10-06 Created: 2023-10-06 Last updated: 2023-12-27Bibliographically approved
Khodakhah, F., Mahmood, A., Abedin, S. F., Thar, K., Österberg, P. & Gidlund, M. (2022). Design and Resource Allocation of NOMA-based Transmission Scheme for Industrial Collaborative AR. In: 2022 IEEE GLOBECOM Workshops, GC Wkshps 2022 - Proceedings: . Paper presented at 2022 IEEE GLOBECOM Workshops, GC Wkshps 2022, 4 December 2022 through 8 December 2022 (pp. 1604-1609). IEEE conference proceedings
Open this publication in new window or tab >>Design and Resource Allocation of NOMA-based Transmission Scheme for Industrial Collaborative AR
Show others...
2022 (English)In: 2022 IEEE GLOBECOM Workshops, GC Wkshps 2022 - Proceedings, IEEE conference proceedings, 2022, p. 1604-1609Conference paper, Published paper (Refereed)
Abstract [en]

Collaborative augmented reality (AR), which enables interaction and consistency in multi-user AR scenarios, is a promising technology for AR-guided remote monitoring, optimization, and troubleshooting of complex manufacturing processes. However, for uplink high data rate demands in collaborative-AR, the design of an efficient transmission and resource allocation scheme is demanding in resource-constrained wireless systems. To address this challenge, we propose a collaborative non-orthogonal multiple access (C-NOMA)-enabled transmission scheme by exploiting the fact that multi-user interaction often leads to common and individual views of the scenario (e.g., the region of interest). C-NOMA is designed as a two-step transmission scheme by treating these views separately and allowing users to offload the common views partially. Further, we define an optimization problem to jointly optimize the time and power allocation for AR users, with an objective of minimizing the maximum rate-distortion of the individual views for all users while guaranteeing a target distortion of their common view for its mutual significance. For its inherent non-linearity and non-convexity, we solve the defined problem using a primal-dual interior-point algorithm with a filter line search as well as by developing a successive convex approximation (SCA) method. The simulation results demonstrate that the optimized C-NOMA outperforms the non-collaborative baseline scheme by 23.94% and 77.28% in terms of energy consumption and achievable distortion on the common information, respectively. 

Place, publisher, year, edition, pages
IEEE conference proceedings, 2022
Keywords
AR, interior-point filter line search, NOMA, rate-distortion, successive convex approximation (SCA)
National Category
Telecommunications
Identifiers
urn:nbn:se:miun:diva-47508 (URN)10.1109/GCWkshps56602.2022.10008766 (DOI)2-s2.0-85146910037 (Scopus ID)9781665459754 (ISBN)
Conference
2022 IEEE GLOBECOM Workshops, GC Wkshps 2022, 4 December 2022 through 8 December 2022
Available from: 2023-02-07 Created: 2023-02-07 Last updated: 2025-03-21Bibliographically approved
Lundberg, H., Mowla, N. I., Fakhrul Abedin, S., Thar, K., Mahmood, A., Gidlund, M. & Raza, S. (2022). Experimental Analysis of Trustworthy In-Vehicle Intrusion Detection System using eXplainable Artificial Intelligence (XAI). IEEE Access, 10, 102831-102841
Open this publication in new window or tab >>Experimental Analysis of Trustworthy In-Vehicle Intrusion Detection System using eXplainable Artificial Intelligence (XAI)
Show others...
2022 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 10, p. 102831-102841Article in journal (Refereed) Published
Abstract [en]

Anomaly-based In-Vehicle Intrusion Detection System (IV-IDS) is one of the protection mechanisms to detect cyber attacks on automotive vehicles. Using artificial intelligence (AI) for anomaly detection to thwart cyber attacks is promising but suffers from generating false alarms and making decisions that are hard to interpret. Consequently, this issue leads to uncertainty and distrust towards such IDS design unless it can explain its behavior, e.g., by using eXplainable AI (XAI). In this paper, we consider the XAI-powered design of such an IV-IDS using CAN bus data from a public dataset, named “Survival”. Novel features are engineered, and a Deep Neural Network (DNN) is trained over the dataset. A visualization-based explanation, “VisExp”, is created to explain the behavior of the AI-based IV-IDS, which is evaluated by experts in a survey, in relation to a rule-based explanation. Our results show that experts’ trust in the AI-based IV-IDS is significantly increased when they are provided with VisExp (more so than the rule-based explanation). These findings confirm the effect, and by extension the need, of explainability in automated systems, and VisExp, being a source of increased explainability, shows promise in helping involved parties gain trust in such systems. Author

Keywords
Artificial intelligence, Automotive, Automotive engineering, Behavioral sciences, Deep Learning, Intrusion detection, Intrusion Detection System, Machine Learning, Random forests, Trust management, Trustworthiness, XAI
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:miun:diva-46301 (URN)10.1109/ACCESS.2022.3208573 (DOI)000864338300001 ()2-s2.0-85139441364 (Scopus ID)
Available from: 2022-10-19 Created: 2022-10-19 Last updated: 2022-10-20Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-9390-6511

Search in DiVA

Show all publications