Indoor Localization Using Data Augmentation Via Selective Generative Adversarial Networks
Indoor Localization Using Data Augmentation Via Selective Generative Adversarial Networks
2021.
Digital Object Identifier 10.1109/ACCESS.2021.3095546
ABSTRACT Several location-based services require accurate location information in indoor environments.
Recently, it has been shown that deep neural network (DNN) based received signal strength indicator (RSSI)
fingerprints achieve high localization performance with low online complexity. However, such methods
require a very large amount of training data, in order to properly design and optimize the DNN model,
which makes the data collection very costly. In this paper, we propose generative adversarial networks
for RSSI data augmentation which generate fake RSSI data based on a small set of real collected labeled
data. The developed model utilizes semi-supervised learning in order to predict the pseudo-labels of the
generated RSSIs. A proper selection of the generated data is proposed in order to cover the entire considered
indoor environment, and to reduce the data generation error by only selecting the most realistic fake RSSIs.
Extensive numerical experiments show that the proposed data augmentation and selection scheme leads to
a localization accuracy improvement of 21.69% for simulated data and 15.36% for experimental data.
INDEX TERMS Indoor localization, received signal strength indicator (RSSI), deep neural network (DNN),
generative adversarial network (GAN), semi-supervised learning.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
VOLUME 9, 2021 98337
W. Njima et al.: Indoor Localization Using Data Augmentation via Selective GANs
Using such methods, a saved DL model based on collected reference positions as proposed in [34], but we generate RSSI
fingerprint database, trained offline, is used online for accu- data for new unknown positions to cover the whole environ-
rate information location prediction which minimizes the ment. In addition, we propose in this work to apply a selection
online complexity. A variety of localization systems based process of the generated fake data that considers constraints
on DL methods (e.g. for collected data completion [20], on both the coverage and the credibility of the generated data.
noise minimization [21], and location estimation [22]) have The proposed algorithm is validated and tested on simulated
been proposed in the literature and provide good localization environments using realistic propagation model parameters
performance. However, in order to build an efficient DL measured from experiments. To support simulation results,
model, these methods are data intensive, requiring very large we apply our proposed system on real measurements from
amounts of training data, the acquisition of which is a time the public UJIndoorLoc database [36].
and energy consuming task. To address this issue, some The remainder of this paper is organized as follows:
recent approaches that leverage semi-supervised learning Section II formulates the localization problem and describes
have been introduced, combining a small set of collected the system model. The proposed selective semi-supervised
labeled data and a large set of collected unlabeled data GANs for data augmentation is presented in Section III. The
[23]–[25]. Nevertheless, collecting unlabeled data can still environmental setting and obtained simulation results are
be expensive, and thus, in this paper we investigate using provided and discussed in Section IV. Experimental results
generative models [26]–[28] for data augmentation without based on real measurements from the UJIndoorLoc database
any extra data collection. are presented in Section V. Finally, Section VI concludes our
In the last few years, generative models have attracted work.
significant interest in the research community due to their
promising benefits in different fields. Generative models II. INDOOR LOCALIZATION SCENARIOS AND
have shown a good ability to produce realistic supplement FINGERPRINTING TECHNIQUE
various types of data such as images, texts and sounds. In this section, we briefly describe the limitations of exist-
In particular, generative adversarial networks (GANs) have ing indoor localization systems based on RSSI fingerprints.
been employed [29]–[31] to generate additional measure- And, we detail different steps of the proposed system model
ments, which reduces collection time and saves human developed to address the problem of interest.
effort. Such networks generate samples with improved diver-
sity and expand the training database in order to ensure a A. SYSTEM MODEL DESCRIPTION
proper design of deep neural networks (DNNs) in different We consider an indoor environment covering (L × W ) m2 ,
fields including localization. In [32], GANs are used with where WiFi technology is deployed using M access points
semi-supervised learning where GANs use both labeled and (APs). As depicted in Fig. 1, the system consists of two main
unlabeled data to share weights with a localization classifier parts: the central unit (CU) which performs all the data pro-
in order to benefit from data contained in unlabeled infor- cessing and localization, and the mobile sensor nodes. There
mation when labeled data are not sufficient. The authors are two types of mobile sensor nodes: those used during the
in [33] aim to construct an efficient radio map covering training phase in order to collect RSSI measurements for the
free space (e.g, open spaces and corridors) and constrained training database construction and those requesting online to
spaces. In this experiment, the data corresponding to the free be localized. To enhance the richness of the fingerprint RSSI
space environment are measured, whereas the data for the database, GANs are used to generate fake RSSI fingerprints.
constrained space are artificially generated. This is justified Let pij be the RSSI measured at the i-th position of the signal
by the difficulties in performing measurement under space transmitted by the j-th AP.
constraints. In the works described in [34], and [35], the ini-
tial training fingerprint database is expanded increasing the B. FINGERPRINTING BASED LOCALIZATION
amount of training data collected at each reference point In this section, we present the standard fingerprinting tech-
based on GANs in order to enhance its richness. For this, nique when used with DNN models. Then, we detail briefly
a collection of signal measurements have been done at dif- our system model steps including data collection and data
ferent reference points and GANs have been used in order training.
to generate additional measurements at each reference point
to enhance the diversity of collected data at each reference 1) DNN-BASED FINGERPRINTING
position. RSSI-based positioning systems can be divided into two cat-
In this paper, unlike [32], we do not assume the availability egories: geometric methods and fingerprints-based methods.
of unlabeled data to enhance the training of the generative Among them, fingerprinting is widely studied and adopted
model, and we do not assume having sufficient collected because of its localization accuracy and implementation sim-
data for particular regions as assumed in [33] for free space. plicity. It consists of two main phases: an offline phase
We consider an extreme and realistic case where only a small called also a training phase and an online phase called a
amount of labeled data is available. We also do not use GANs test phase. During the offline phase, RSSI measurements are
to increase the diversity of the RSSI data for specific known collected at each measurement location (training position)
FIGURE 1. The pipeline of the proposed selective GANs based localization method during the training phase.
from different radio signal transmitters, essentially APs when a proper data selection protocol should be developed to over-
considering WiFi signals. These collected RSSIs with their come these issues.
location coordinates are transferred to a CU and stored in a
training database. In the online phase, RSSIs from different 2) DATA COLLECTION AND DATA TRAINING
APs are measured and compared with the ones collected and In this part, we present in details the collection of labeled data,
stored in the training database to predict the location of the as well as the whole process of collected data pre-processing
target. This prediction can be performed by a DNN model and training.
which can be trained offline and applied directly online. The
use of DNN models for location prediction is recommended a. Fingerprint database collection: In this paper, we con-
since most of the online complexity is shifted to the offline sider a noisy indoor environment as the area of interest
phase. DNN is recommended for accurate indoor localization in order to collect RSSI fingerprints during the offline
due to the fact that it is able to learn signal fluctuations phase including training and testing data.
through time and environmental dynamicity because of its b. Data augmentation: Data augmentation is used to sup-
deeper functions that map the input to the output [37], [38]. plement data when it is too expensive and rare. Thus,
In order to achieve good localization accuracy using an opti- it aims to increase the size and the diversity of a dataset
mal trained DNN model, a large amount of expensively col- by generating new fake samples based on real ones.
lected data is required during the offline phase which makes • Data generation: Based on collected RSSI vectors,
the fingerprinting method labor intensive and time/cost con- extra fake data are generated using a GAN in order
suming. To solve this issue, a selective GAN indoor localiza- to expand the dataset and ensure its diversity.
tion framework combined with semi-supervised learning is • Data pseudo-labeling: Once fake RSSI vectors are
proposed and detailed in this paper, which performs location generated, an artificial pseudo-label is associated with
prediction based on collected labeled data and fake gener- each vector using semi-supervised learning.
ated pseudo-labeled data. This system takes advantage of c. Data selection: After data generation and pseudo-
generating fake data and mixing it with labeled data in the labeling, we apply a data selection method. We first
training process in order to reduce the reliance on expensively generate a very large number of fake samples to cover
collected data. However, generated data can be unrealistic the whole environment, and then we eliminate unneces-
and can create imbalanced classes when the generated data sary and inaccurate RSSI data in order to improve the
happens to be more dense for specific regions. Therefore, localization accuracy.
d. Localization based on DNNs: To localize a target, discriminator model D. For each DNN model, we introduce
a trained DNN model is applied to estimate its coordi- an input vector i(0) ∈ RN0 ×1 and its associated output vector
nates based on the corresponding collected RSSI vector. o ∈ RNH +1 ×1 . Let Nh be the number of neurons for the hth
During the training process, all of the RSSI vectors layer, such that 0 ≤ h ≤ H + 1 where H is the number
(e.g, real collected vectors and selected fake gener- of hidden layers. bh ∈ RNh ×1 and Wh ∈ RNh ×Nh−1 denote
ated vectors) are fitted to the model as inputs and the the biases and the weights matrices, respectively. The output
corresponding coordinates are considered as outputs. vector of the hth layer can be expressed as
o(h) = gh (b(h) + W(h) i(h−1) ), i(h) = o(h) , (1)
III. PROPOSED SELECTIVE SEMI-SUPERVISED GAN
FOR LOCATION DATA AUGMENTATION where the input vector i(h) undergoes a linear transformation
In this section, we describe in detail different steps of the represented by W(h) , a bias vector b(h) , and then a nonlinear
proposed localization system. activation function g(h) is applied. During DNN training,
the loss function L(θ) = L(W , b) is calculated in order to
A. DATA GENERATION update iteratively the DNN parameters θ = (W , b).
1) INTUITION BEHIND GANs • Training the generator: Let Z ∈ RM ×mf be the input
Generative models aim at learning the true data distribution dataset of the generator, such that each column z(i) ∈
of a training set in order to generate realistic new sam- RM ×1 , i = 1, · · · , mf corresponds to a random noise
ples with some variations. Thus, we try to produce samples vector whose samples are uniformly distributed over
with a distribution that is as similar as possible to the true [−1, 1[. At the output of the DNN generator, each input
data distribution. GANs are generative models that include noise vector z(i) produces a fake RSSI vector G(z(i) ) ∈
two components [39]: the generator and the discriminator, RM ×1 . The fake output vector is generated following (1),
as shown in Fig. 2. The generator model takes random noise where i(0) = z(i) , N0 = M , o(H +1) = G(z(i) ) and
as input and learns how to produce a realistic output rep- NH +1 = M . Then, G(z(i) ) is passed to the DNN dis-
resentation similar to the real data, while the discriminator criminator D(·) which makes a prediction of how real-
learns how to distinguish between fake and real samples. istic G(z(i) ) is. The generator loss is then calculated by
These two models are trained together until the generator is minimizing the loss function:
able to generate realistic examples from input noise. GANs mf
h 1 X i
have achieved impressive performance across a multitude of LG = ∇θg − log D G(z(i) ) . (2)
tasks (e.g. face generation, 3D object generation, and image mf
i=1
translation from one domain to another) and many companies Once the loss function is minimized, and the parameters
are using them including Google for text generation, IBM for θg = (Wg , bg ) do not change significantly after further
data augmentation, Adobe for next generation photoshop and iterations, we can save the generator DNN parameters.
Snapchat-Tiktok for image filters. • Training the discriminator: The discriminator learns
GANs are used for data augmentation in our case, which to distinguish real from fake. At the beginning of the
means the generated data can be used to supplement real training, it does not know which vectors are real and
data to increase dataset size and diversity by using generated which ones are fake. However, it has access to real
samples. The goal is to augment the dataset when real data data in order to compare them with input vectors and
are too expensive to collect. classify the input vectors as real or fake. Thus, the dis-
criminator receives more and more realistic examples
2) GAN TRAINING at each round from the generator till the examples are
GANs consist of two different neural networks: the gener- good enough to fill the discriminator. The discriminator
ator and the discriminator. To train a GAN, we alternate acts as a binary classifier and computes a probability of
the training of the DNN generator model G and the DNN an example being fake D(G(z(i) )), following (1), giving
FIGURE 2. GAN network for fake RSSI data generation during training.
both fake generated samples G(Z ), and the real dataset process, these fake vectors are going to be pseudo-labeled
P ∈ RM ×mr of collected mr RSSIs vectors denoted as and selected. For this, collected RSSI vectors are used as
p(i) , i = 1, . . . , mr . This probability will be given to inputs to a supervised DNN model that takes as outputs
the generator to improve its performance as expressed the corresponding labels, e.g. coordinates during training.
in (2). The training of the discriminator is performed Once trained, fake generated RSSI vectors are given to the
by minimizing the loss function derived from the binary model to predict the associated artificial pseudo-labels. Then,
cross-entropy (BCE) between the real and generated a general model used for localization is trained on real and
data [40]: selected data. The selection procedure is described in detail
h 1 X
mr in subsection III-C.
log D(p(i) )
Ld = ∇θd −
mr
i=1 C. SELECTION CRITERIA OF GENERATED FAKE DATA
mf
1 X i Initially, the idea of this work was to generate RSSI vectors,
− log 1 − D G(z(i) ) , (3) to generate more data and cover the whole environment, and
mf
i=1 then to estimate their pseudo-labels to build a mixed and
where θd = (Wd , bd ) are the parameters of the discrim- rich dataset. We have generated a large amount of fake data
inator DNN model D(.). log(D(p(i) )) refers to the log and tested the resulting system. However, when plotting the
probability that the discriminator is correctly classifying pseudo labels of the generated RSSIs, i.e. positions, we have
the real examples while maximizing log 1−D G(z(i) ) noticed that (i) generated positions do not cover the whole
area of the considered environment, (ii) these positions are
would help the discriminator to correctly label the fake sometimes condensed in a specific area, and (iii) generating
sample that comes from the generator. a higher number of fake data does not necessarily lead to
a better localization accuracy. Therefore, we introduce here
3) FAKE DATA GENERATION BASED ON GANs
selection criteria in order to choose only a useful subset of
Given a small number of training labeled data samples, extra the generated fake data:
fake RSSI vectors are generated based on the GAN. The
generator takes as inputs noise vectors that are going to be • Criterion 1: Environment coverage: Here, we con-
fitted to the discriminator with the real RSSI vectors. Based sider that our environment E is uniformly divided into
on the discriminator’s outputs, the generator and the discrimi- zones ej each one covering (lj × wj ) m2 , such that
2
P
nator models are updated in order to enhance its performance j lj × wj = L × W m . After randomly generating
generation and classification. We generate mf fake RSSI a large amount of data (RSSI vectors and the pseudo
vectors ∈ R(M ×1) based on the dataset of collected RSSI positions), we build a new dataset by selecting for each
vectors, mf is fixed experimentally in order to choose the best zone ej a number Nj of data samples proportional to its
number of generated vectors that gives the best localization surface area (lj ×wj ) m2 , i.e. the pseudo positions fall into
improvement. the desired zone ej . Thus, redundant data are eliminated,
and the whole environment E is covered and each zone
B. SEMI-SUPERVISED FOR PSEUDO-LABELING ej is equally
P represented in the new dataset that contains
OF GENERATED DATA ms = j Nj selected sample. We have first tried to select
Pseudo-labeling aims to estimate the labels of an unlabeled randomly Nj samples per zone ej , but we have realized
dataset given a DNN model trained on a labeled one. In the that this random selection can be improved by selecting
localization context, the labels correspond to the users’ loca- only the most realistic ms fake data, which leads us to
tion information (a room ID, a floor ID, a zone identifier, Criterion 2.
2-D / 3-D coordinates, etc.). The 2-D coordinates are the used • Criterion 2: Most realistic fake data: The selection
labels in our work. The steps of the pseudo-labeling process of the Nj most realistic fake data samples per zone ej
are summarized as follows: is performed by comparing the score of each generated
• Step 1: The DNN model is trained on labeled RSSI RSSI G(z(i) ) at the output of the discriminator D(G(z(i) )).
fingerprints only, in a supervised way. Thus, in each zone ej , we select the Nj positions that are
• Step 2: Based on the trained DNN model, ’pseudo- most likely to be real, i.e. associated with the Nj lowest
labels’ are predicted for generated unlabeled RSSI vec- loss function values:
tors. mr
• Step 3: A mixed DNN model is trained combining (i)
h 1 X
log D(p(j) )
Ld = ∇θd −
labeled and selected pseudo-labeled data. To train such a mr
j=1
model, the collected and selected RSSI vectors are used i
as inputs, and the corresponding associated labels (real − log 1 − D G(z(i) ) , (4)
labels and artificial pseudo-labels) are used as outputs.
During the fake data generation step, we produce unlabeled where p(j) , j = 1, . . . , mr is the jth real collected RSSI
RSSI vectors. In order to be integrated into our localization vector.
FIGURE 5. Generated positions and selected positions based on defined selection criterions.
TABLE 3. Obtained localization performance considering 1000 real fingerprints corresponding to Building1-Floor2 from UJIndoorLoc database.
[8] A. B. M. M. Rahman, T. Li, and Y. Wang, ‘‘Recent advances in indoor [31] A. Belmonte-Hernández, G. Hernandez-Penaloza, D. M. Gutiérrez, and
localization via visible lights: A survey,’’ Sensors, vol. 20, no. 5, p. 1382, F. Alvarez, ‘‘Recurrent model for wireless indoor tracking and positioning
Mar. 2020. recovering using generative networks,’’ IEEE Sensors J., vol. 20, no. 6,
[9] W. Shao, H. Luo, F. Zhao, Y. Ma, Z. Zhao, and A. Crivello, ‘‘Indoor pp. 3356–3365, Mar. 2020.
positioning based on fingerprint-image and deep learning,’’ IEEE Access, [32] K. M. Chen and R. Y. Chang, ‘‘Semi-supervised learning with GANs
vol. 6, pp. 74699–74712, 2018. for device-free fingerprinting indoor localization,’’ in Proc. IEEE Global
[10] N. Tadayon, M. T. Rahman, S. Han, S. Valaee, and W. Yu, ‘‘Decimeter Commun. Conf. (GLOBECOM), Dec. 2020, pp. 1–6.
ranging with channel state information,’’ IEEE Trans. Wireless Commun., [33] H. Zou, C.-L. Chen, M. Li, J. Yang, Y. Zhou, L. Xie, and C. J. Spanos,
vol. 18, no. 7, pp. 3453–3468, Jul. 2019. ‘‘Adversarial learning-enabled automatic WiFi indoor radio map construc-
[11] L. Chen, I. Ahriz, and D. Le Ruyet, ‘‘AoA-aware probabilistic indoor tion and adaptation with mobile robot,’’ IEEE Internet Things J., vol. 7,
location fingerprinting using channel state information,’’ IEEE Internet no. 8, pp. 6946–6954, Aug. 2020.
Things J., vol. 7, no. 11, pp. 10868–10883, Nov. 2020. [34] Q. Li, H. Qu, Z. Liu, N. Zhou, W. Sun, S. Sigg, and J. Li, ‘‘AF-DCGAN:
[12] Z. Yang, Z. Zhou, and Y. Liu, ‘‘From RSSI to CSI: Indoor localization Amplitude feature deep convolutional GAN for fingerprint construction in
via channel response,’’ ACM Comput. Surv., vol. 46, no. 2, pp. 1–32, indoor localization systems,’’ IEEE Trans. Emerg. Topics Comput. Intell.,
2013. vol. 5, no. 3, pp. 468–480, Jun. 2021.
[13] P. Kumar, L. Reddy, and S. Varma, ‘‘Distance measurement and error esti- [35] Y. Lei, D. Li, H. Zhang, and X. Li, ‘‘Wavelet feature outdoor fingerprint
mation scheme for RSSI based localization in wireless sensor networks,’’ localization based on ResNet and deep convolution GAN,’’ Symmetry,
in Proc. 5th Int. Conf. Wireless Commun. Sensor Netw. (WCSN), Dec. 2009, vol. 12, no. 9, p. 1565, Sep. 2020.
pp. 1–4. [36] J. Torres-Sospedra, R. Montoliu, A. Martínez-Usó, J. P. Avariento,
[14] Z. Yang and Y. Liu, ‘‘Quality of trilateration: Confidence-based itera- T. J. Arnau, M. Benedito-Bordonau, and J. Huerta, ‘‘UJIIndoorLoc: A new
tive localization,’’ IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 5, multi-building and multi-floor database for WLAN fingerprint-based
pp. 631–640, May 2010. indoor localization problems,’’ in Proc. Int. Conf. Indoor Positioning
Indoor Navigat. (IPIN), Oct. 2014, pp. 261–270.
[15] S. Yiu, M. Dashti, H. Claussen, and F. Perez-Cruz, ‘‘Wireless RSSI finger-
[37] K. S. Kim, R. Wang, Z. Zhong, Z. Tan, H. Song, J. Cha, and S. Lee,
printing localization,’’ Signal Process., vol. 131, pp. 235–244, Feb. 2017.
‘‘Large-scale location-aware services in access: Hierarchical building/floor
[16] M. I. AlHajri, N. T. Ali, and R. M. Shubair, ‘‘Indoor localization for IoT
classification and location estimation using Wi-Fi fingerprinting based on
using adaptive feature selection: A cascaded machine learning approach,’’
deep neural networks,’’ Fiber Integr. Opt., vol. 37, no. 5, pp. 277–289,
IEEE Antennas Wireless Propag. Lett., vol. 18, no. 11, pp. 2306–2310,
Sep. 2018.
Nov. 2019.
[38] K. S. Kim, S. Lee, and K. Huang, ‘‘A scalable deep neural network
[17] W. Njima, I. Ahriz, R. Zayani, M. Terre, and R. Bouallegue, ‘‘Deep CNN
architecture for multi-building and multi-floor indoor localization based on
for indoor localization in IoT-sensor systems,’’ Sensors, vol. 19, no. 14,
Wi-Fi fingerprinting,’’ Big Data Anal., vol. 3, no. 1, pp. 1–17, Dec. 2018.
p. 3127, Jul. 2019.
[39] I. J. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley,
[18] W. Njima, M. Chafii, A. Nimr, and G. Fettweis, ‘‘Deep learning based data S. Ozair, A. Courville, and Y. Bengio, ‘‘Generative adversarial net-
recovery for localization,’’ IEEE Access, vol. 8, pp. 175741–175752, 2020. works,’’ 2014, arXiv:1406.2661. [Online]. Available: http://arxiv.org/
[19] Z. Chen, M. I. AlHajri, M. Wu, N. T. Ali, and R. M. Shubair, ‘‘A novel abs/1406.2661
real-time deep learning approach for indoor localization based on RF [40] L. Mescheder, A. Geiger, and S. Nowozin, ‘‘Which training methods for
environment identification,’’ IEEE Sensors Lett., vol. 4, no. 6, pp. 1–4, GANs do actually converge?’’ in Proc. Int. Conf. Mach. Learn., 2018,
Jun. 2020. pp. 3481–3490.
[20] R. Wang, Z. Li, H. Luo, F. Zhao, W. Shao, and Q. Wang, ‘‘A robust Wi-Fi [41] D. P. Kingma and J. Ba, ‘‘Adam: A method for stochastic opti-
fingerprint positioning algorithm using stacked denoising autoencoder and mization,’’ 2014, arXiv:1412.6980. [Online]. Available: http://arxiv.org/
multi-layer perceptron,’’ Remote Sens., vol. 11, no. 11, p. 1293, May 2019. abs/1412.6980
[21] J. Fan and T. Chow, ‘‘Deep learning based matrix completion,’’ Neurocom-
puting, vol. 266, pp. 540–549, Nov. 2017.
[22] R. Ayyalasomayajula, A. Arun, C. Wu, S. Sharma, A. R. Sethi, D. Vasisht,
and D. Bharadia, ‘‘Deep learning based wireless localization for indoor
navigation,’’ in Proc. 26th Annu. Int. Conf. Mobile Comput. Netw.,
Apr. 2020, pp. 1–14.
[23] W. Li, C. Zhang, and Y. Tanaka, ‘‘Pseudo label-driven federated learning-
based decentralized indoor localization via mobile crowdsourcing,’’ IEEE
Sensors J., vol. 20, no. 19, pp. 11556–11565, Oct. 2020.
[24] Y. Xia, L. Ma, Z. Zhang, and Y. Wang, ‘‘Semi-supervised positioning algo-
rithm in indoor WLAN environment,’’ in Proc. IEEE 81st Veh. Technol.
Conf. (VTC Spring), May 2015, pp. 1–5.
[25] M. Zhou, Y. Tang, W. Nie, L. Xie, and X. Yang, ‘‘GrassMA: Graph-
based semi-supervised manifold alignment for indoor WLAN localiza-
tion,’’ IEEE Sensors J., vol. 17, no. 21, pp. 7086–7095, Nov. 2017.
[26] A. Antoniou, A. Storkey, and H. Edwards, ‘‘Data augmentation genera-
tive adversarial networks,’’ 2017, arXiv:1711.04340. [Online]. Available:
http://arxiv.org/abs/1711.04340
[27] C. Bowles, R. Gunn, A. Hammers, and D. Rueckert, ‘‘GANsfer WAFA NJIMA (Member, IEEE) was born in
learning: Combining labelled and unlabelled data for GAN based Tunisia, in 1991. She received the degree in engi-
data augmentation,’’ 2018, arXiv:1811.10669. [Online]. Available:
neering from the Institut National des Sciences
http://arxiv.org/abs/1811.10669
Appliquées et de Technologies, Tunis, in 2015, and
[28] A. Brock, J. Donahue, and K. Simonyan, ‘‘Large scale GAN training for
the Ph.D. degree in radio-communications from
high fidelity natural image synthesis,’’ 2018, arXiv:1809.11096. [Online].
Available: http://arxiv.org/abs/1809.11096 the Conservatoire National des Arts et Métiers,
[29] A. Odena, ‘‘Semi-supervised learning with generative adversarial Paris, in 2019, in collaboration with the Ecole
networks,’’ 2016, arXiv:1606.01583. [Online]. Available: http://arxiv. Supérieure des Communications de Tunis, under
org/abs/1606.01583 the supervision of Prof. Michel Terré and Prof.
[30] C. Bowles, L. Chen, R. Guerrero, P. Bentley, R. Gunn, A. Hammers, Ridha Bouallegue. She is currently a Postdoctoral
D. A. Dickie, M. V. Hernández, J. Wardlaw, and D. Rueckert, Researcher with CNRS, ETIS UMR 8051, ENSEA, CY Cergy Paris Uni-
‘‘GAN augmentation: Augmenting training data using generative versity, France. Her publications span several research areas, including sig-
adversarial networks,’’ 2018, arXiv:1810.10863. [Online]. Available: nal processing, wireless communications, sparse data, indoor localization,
http://arxiv.org/abs/1810.10863 the IoT, and machine learning for communications.
MARWA CHAFII (Member, IEEE) received the RAED M. SHUBAIR (Senior Member, IEEE)
master’s degree in advanced wireless communica- received the Ph.D. degree in electrical engineering
tion systems (SAR) and the Ph.D. degree in elec- from the University of Waterloo, Canada, in 1993.
trical engineering from CentraleSupélec, France, From 1993 to 2017, he was a Full Professor of elec-
in 2013 and 2016, respectively. From 2014 to trical engineering with Khalifa University, United
2016, she has been a Visiting Researcher with the Arab Emirates. He is currently a Full Professor
Poznan University of Technology, Poland; the Uni- of electrical engineering affiliated to New York
versity of York, U.K.; Yokohama National Univer- University (NYU) Abu Dhabi. His current and past
sity, Japan; and the University of Oxford, U.K. She academic and research appointments also include
joined the Vodafone Chair Mobile Communication the Massachusetts Institute of Technology (MIT),
Systems, Technical University of Dresden, Germany, in February 2018, as a Harvard University, and the University of Waterloo. His publication span
Research Group Leader. Since September 2018, she has been an Associate several research areas, including 6G and terahertz communications, mod-
Professor with ENSEA, France, where she holds the Chair of Excellence ern antennas and applied electromagnetics, signal and array processing,
on artificial intelligence from CY Initiative. Her research interests include machine learning, the IoT and sensor localization, medical sensing, and
advanced waveform design, machine learning for wireless communications, nano-biomedicine. He is a fellow of the MIT Electromagnetics Academy, and
and indoor localization. She received the prize of the Best Ph.D. in France a Founding Member of MIT Scholars of the Emirates and five IEEE society
in the fields of signal, image and vision, and she has been nominated in chapters, United Arab Emirates. He received the University of Waterloo
the top ten Rising Stars in Computer Networking and Communications by Distinguished Doctorate Dissertation Award for his Ph.D. degree. He was a
N2Women, in 2020. She is currently the Vice-Chair of the IEEE ComSoc ETI recipient of several international awards, including the Distinguished Service
on Machine Learning for Communications, leading the Education Working Award from ACES Society, USA, and the MIT Electromagnetics Academy,
Group, ETI on Integrated Sensing and Communications, a Research Lead USA. He is also a standing member of the editorial boards of several
with Women in AI, and managing the Gender Committee of the AI4EU international journals and serves regularly on the steering, organizing, and
Community. Since 2019, she has been serving as an Associate Editor for technical committees of IEEE flagship conferences in antennas, communi-
IEEE COMMUNICATIONS LETTERS, where she received the Best Editor Award, cations, and signal processing, including IEEE AP-S/URSI, EuCAP, IEEE
in 2020. GloablSIP, IEEE WCNC, and IEEE ICASSP. He is also a Board Member of
the European School of Antennas and the Regional Director for the IEEE
Signal Processing Society in IEEE Region 8 Middle East, and served as the
Founding Chair of the IEEE Antennas and Propagation Society Educational
Initiatives Program. He is also the Founder and the Chair of IEEE at NYUAD.
He is also an Officer of IEEE ComSoc Emerging Technical Initiative on
Machine Learning for Communications. He is also the Founding Director
of the IEEE UAE Distinguished Seminar Series Program for which he was
selected to receive, along with Mohamed AlHajri of MIT, the 2020 IEEE
UAE Award of the Year. He is also an Editor of the IEEE JOURNAL OF
ELECTROMAGNETICS, RF AND MICROWAVES IN MEDICINE AND BIOLOGY, and the
IEEE OPEN JOURNAL OF ANTENNAS AND PROPAGATION.