skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Creators/Authors contains: "Fadlullah, Zubair Md"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Cell-free networks have emerged as a new paradigm for beyond-5G networks, offering uniform coverage and improved control over interference. However, scalability poses a challenge in full cell-free networks, where all access points (APs) serve all users. This challenge is addressed by user-centric clustering, where each user is served by a subset of APs, reducing complexity while maintaining coverage. In this paper, we provide an analysis of the relation between the user-centric clustering and pilot assignment problems in cell-free networks, and introduce a formulation which decouples both problems enabling each to be solved independently. We present a general problem formulation for the user-centric clustering problem, allowing the use of diverse per-user and network-wide performance metrics. Specifically, we focus on one instance of this framework, utilizing per-user spectral efficiency and network-wide sum spectral efficiency (SE) as metrics. Additionally, we formulate the pilot assignment problem to minimize overall channel estimation error while considering the user-centric clusters in evaluating the desirability of pilot assignments, which leads to better performing solutions. Both problems are classified as binary nonlinear programs that are at least NP-hard. To solve these optimization problems, our proposed methodology employs sample average approximation coupled with surrogate optimization for the user-centric clustering problem and utilizes the genetic algorithm for the pilot assignment problem. Numerical experiments demonstrate that the optimized solutions surpass baseline solutions, leading to significant improvements in spectral efficiency. 
    more » « less
    Free, publicly-accessible full text available April 3, 2026
  2. With the proliferation of Beyond 5G (B5G) communication systems and heterogeneous networks, mobile broadband users are generating massive volumes of data that undergo fast processing and computing to obtain actionable insights. While analyzing this huge amount of data typically involves machine and deep learning-based data-driven Artificial Intelligence (AI) models, a key challenge arises in terms of providing privacy assurances for user-generated data. Even though data-driven techniques have been widely utilized for network traffic analysis and other network management tasks, researchers have also identified that applying AI techniques may often lead to severe privacy concerns. Therefore, the concept of privacy-preserving data-driven learning models has recently emerged as a hot area of research to facilitate model training on large-scale datasets while guaranteeing privacy along with the security of the data. In this paper, we first demonstrate the research gap in this domain, followed by a tutorial-oriented review of data-driven models, which can be potentially mapped to privacy-preserving techniques. Then, we provide preliminaries of a number of privacy-preserving techniques (e.g., differential privacy, functional encryption, Homomorphic encryption, secure multi-party computation, and federated learning) that can be potentially adopted for emerging communication networks. The provided preliminaries enable us to showcase the subset of data-driven privacy-preserving models, which are gaining traction in emerging communication network systems. We provide a number of relevant networking use cases, ranging from the B5G core and Radio Access Networks (RANs) to semantic communications, adopting privacy-preserving data-driven models. Based on the lessons learned from the pertinent use cases, we also identify several open research challenges and hint toward possible solutions. 
    more » « less
  3. Free, publicly-accessible full text available December 3, 2025
  4. This paper addresses the user-centric clustering and pilot assignment problems in cell-free networks, recognizing the need to solve both problems simultaneously. The motivation of this research stems from the absence of benchmarks, general formulations, and the reliance on subjectively designed objective functions and heuristic algorithms prevalent in existing literature. To tackle these challenges, we formulate stochastic non-linear binary integer programs for both the user-centric clustering and pilot assignment problems. We specifically design the pilot assignment formulation to incorporate user-centric clusters when evaluating the desirability of pilot assignments, resulting in improved efficiency. To solve the problems, the proposed methodology employs sample average approximation coupled with surrogate optimization for the user-centric clustering problem and the genetic algorithm for the pilot assignment problem. Numerical experiments demonstrate that the optimized solutions outperform baseline solutions, leading to significant gains in spectral efficiency. 
    more » « less
  5. As vehicular communication networks embrace metaverse beyond 5G/6G systems, the rich content update via the least interfered subchannel of the optimal frequency band in a hybrid band vehicle to everything (V2X) setting emerges as a challenging optimization problem. We model this problem as a tradeoff between multi-band VR/AR devices attempting to perform metaverse scenes and environmental updates to metaverse roadside units (MRSUs) while minimizing energy consumption. Due to the computational hardness of this optimization, we formulate an opportunistic band selection problem using a multi-armed bandit (MAB) that provides a good quality solution in real-time without computationally burdening the already stretched augmented/virtual reality (AR/VR) units acting as transmitting nodes. The opportunistic use of scheduling rich content updates at traffic signals and stand-still scenarios maps well with the formulated bandit problem. We propose a Dual-Objective Minimax Optimal Stochastic Strategy (DOMOSS) as a natural solution to this problem. Through extensive computer-based simulations, we demonstrate the effectiveness of our proposal in contrast to baselines and comparable solutions. We also verify the quality of our solution and the convergence of the proposed strategy. 
    more » « less
  6. The emerging Sixth Generation (6G) communication networks promising 100 to 1000 Gb/s rates and ultra-low latency (1 millisecond) are anticipated to have native, embedded Artificial Intelligence (AI) capability to support a myriad of services, such as Holographic Type Communications (HTC), tactile Internet, remote surgery, etc. However, these services require ultra-reliability, which is highly impacted by the dynamically changing environment of 6G heterogeneous tiny cells, whereby static AI solutions fitting all scenarios and devices are impractical. Hence, this article introduces a novel concept called the softwarization of intelligence in 6G networks to select the most ideal, ultra-fast optimal policy based on the highly varying channel conditions, traffic demand, user mobility, and so forth. Our envisioned concept is exemplified in a Multi-Armed Bandit (MAB) framework and evaluated within a use case of two simultaneous scenarios (i.e., Neighbor Discovery and Selection (NDS) in a Device-to-Device (D2D) network and aerial gateway selection in an Unmanned Aerial Vehicle (UAV)-based under-served area network). Furthermore, our concept is evaluated through extensive computer-based simulations that indicate encouraging performance. Finally, related challenges and future directions are highlighted. 
    more » « less