Skip to main content
Research

Publications: Mr Muhammad Fayaz

Fayaz M, Mehmood G, Khan A, Abbas S, Fayaz M, Gwak J ( 2022 ) . Counteracting Selfish Nodes Using Reputation Based System in Mobile Ad Hoc Networks . Electronics (Switzerland) vol. 11 , ( 2 )
Fayaz M, Yi W, Liu Y, Nallanathan A ( 2022 ) . Load and Location Aware Resource Allocation in GF-NOMA IoT Networks . International Conference on Electrical, Computer, Communications and Mechatronics Engineering, ICECCME 2022 .
Fayaz M, Yi W, Liu Y, Nallanathan A ( 2022 ) . Multi-Agent DRL for Mitigating Power Collisions in SGF-NOMA Systems . 2022 IEEE Global Communications Conference, GLOBECOM 2022 - Proceedings . 1509 - 1514 .
Alajmi A, Fayaz M, Ahsan W, Nallanathan A ( 2022 ) . Semi-Centralized Optimization for Energy Efficiency in IoT Networks with NOMA . IEEE Wireless Communications Letters
Alajmi A, Fayaz M, Ahsan W, Nallanathan A ( 2022 ) . Soft Actor Critic Framework for Resource Allocation in Backscatter-NOMA Networks . 2022 IEEE Latin-American Conference on Communications, LATINCOM 2022 .
Fayaz M, Yi W, Liu Y, Nallanathan A ( 2022 ) . Throughput Optimization for SGF-NOMA via Distributed DRL with Prioritized Experience Replay . IEEE International Conference on Communications . vol. 2022-May , 5178 - 5183 .
Fayaz M, Yi W, Liu Y, Nallanathan A ( 2021 ) . Transmit power pool design for grant-free NOMA-IoT networks via deep reinforcement learning . IEEE Transactions on Wireless Communications vol. 20 , ( 11 ) 7626 - 7641 .
Fayaz M, Yi W, Liu Y, Nallanathan A ( 2021 ) . Transmit Power Pool Design for Uplink IoT Networks with Grant-free NOMA . IEEE International Conference on Communications . Conference: ICC 2021 - IEEE International Conference on Communications
Fayaz M, Ur Rahman Z, Ur Rahman M, Abbas S ( 2016 ) . Effect of terrain size and pause time on the performance of reactive routing protocols . Jurnal Teknologi vol. 78 , ( 4-3 ) 89 - 94 .
Rahman MU, Rahman ZU, Fayaz M, Abbas S, ShahSani RK ( 2016 ) . Performance analysis of TCP/AQM under Low-Rate Denial-of-Service attacks . Proceedings of the International Conference on Inventive Computation Technologies, ICICT 2016 . vol. 2016 ,