Search Results for author: Stefano Tomasin

Found 13 papers, 0 papers with code

Fast Iterative Configuration of Reconfigurable Intelligent Surfaces in mmWave Systems

no code implementations5 Mar 2024 Anna V. Guglielmi, Stefano Tomasin

Reconfigurable intelligent surfaces (RISs) are a promising solution to improve the coverage of cellular networks, thanks to their ability to steer impinging signals in desired directions.

User Localization with HRIS and Backscatter Modulation for Next-Generation Networks

no code implementations1 Mar 2024 Mattia Piana, Stefano Tomasin

In the first step, the HRIS operates in full absorption mode and the user equipment (UE) transmits a signal that is locally processed at the HRIS to estimate the angle of arrival (AoA).

Downlink Clustering-Based Scheduling of IRS-Assisted Communications With Reconfiguration Constraints

no code implementations23 May 2023 Alberto Rech, Matteo Pagin, Leonardo Badia, Stefano Tomasin, Marco Giordani, Jonathan Gambini, Michele Zorzi

Intelligent reflecting surfaces (IRSs) are being widely investigated as a potential low-cost and energy-efficient alternative to active relays for improving coverage in next-generation cellular networks.

Clustering Quantization +1

Partial-Information Multiple Access Protocol for Orthogonal Transmissions

no code implementations24 Apr 2023 Alberto Rech, Stefano Tomasin, Lorenzo Vangelista, Cristina Costa

When using PIMA, the BS can acquire partial information on the instantaneous traffic conditions and, using compute-over-the-air techniques, estimate the number of devices with packets waiting for transmission in their queue.

On the Optimal Spoofing Attack and Countermeasure in Satellite Navigation Systems

no code implementations3 Feb 2023 Laura Crosara, Francesco Ardizzon, Stefano Tomasin, Nicola Laurenti

We first derive the optimal attack strategy against a Gaussian transmission from Alice, by minimizing an outer bound on the achievable error probability region of the spoofing detection test.

Learning The Likelihood Test With One-Class Classifiers

no code implementations22 Oct 2022 Francesco Ardizzon, Stefano Tomasin

The artificial dataset is used only for training, while the OCC is used on negative-class samples generated from a different pdf.

One-Class Classification

Machine Learning-Based Distributed Authentication of UWAN Nodes with Limited Shared Information

no code implementations19 Aug 2022 Francesco Ardizzon, Roee Diamant, Paolo Casari, Stefano Tomasin

We propose a technique to authenticate received packets in underwater acoustic networks based on the physical layer features of the underwater acoustic channel (UWAC).

Maximum-Rate Optimization of Hybrid Intelligent Reflective Surface and Relay Systems

no code implementations17 Sep 2021 Alberto Rech, Federico Moretto, Stefano Tomasin

We consider a wireless communication system, where a transmitting source is assisted by both a reconfigurable intelligent reflecting surface (IRS) and a decode-and-forward half-duplex relay (hybrid IRS-relay scheme) to communicate with a destination receiver.

Coordinated Random Access for Industrial IoT With Correlated Traffic By Reinforcement-Learning

no code implementations17 Sep 2021 Alberto Rech, Stefano Tomasin

Time is divided into frames, each split into slots and each MTD randomly selects one slot for (re)transmission, with probability density functions (PDFs) specific of both the MTD and the number of the current retransmission.

reinforcement-learning Reinforcement Learning (RL)

Game-Theoretic Mode Scheduling for Dynamic TDD in 5G Systems

no code implementations26 Apr 2021 Chandan Kumar Sheemar, Leonardo Badia, Stefano Tomasin

We propose a low-complexity and decentralized solution, where power allocation and scheduling are decoupled.

Scheduling

Localization Attack by Precoder Feedback Overhearing in 5G Networks and Countermeasures

no code implementations14 Dec 2020 Stefan Roth, Stefano Tomasin, Marco Maso, Aydin Sezgin

We analyze the attack and assess the obtained localization accuracy against various parameters.

Information Theory Cryptography and Security Signal Processing Information Theory

Machine Learning for Intelligent Authentication in 5G-and-Beyond Wireless Networks

no code implementations30 Jun 2019 He Fang, Xianbin Wang, Stefano Tomasin

The fifth generation (5G) and beyond wireless networks are critical to support diverse vertical applications by connecting heterogeneous devices and machines, which directly increase vulnerability for various spoofing attacks.

BIG-bench Machine Learning Unsupervised Reinforcement Learning

Cannot find the paper you are looking for? You can Submit a new open access paper.