Skip to main content

Showing 1–50 of 78 results for author: Aref, M

.
  1. Rel: A Programming Language for Relational Data

    Authors: Molham Aref, Paolo Guagliardo, George Kastrinis, Leonid Libkin, Victor Marsault, Wim Martens, Mary McGrath, Filip Murlak, Nathaniel Nystrom, Liat Peterfreund, Allison Rogers, Cristina Sirangelo, Domagoj Vrgoc, David Zhao, Abdul Zreika

    Abstract: From the moment of their inception, languages for relational data have been described as sublanguages embedded in a host programming language. Rel is a new relational language whose key design goal is to go beyond this paradigm with features that allow for programming in the large, making it possible to fully describe end to end application semantics. With the new approach we can model the semanti… ▽ More

    Submitted 24 April, 2025; v1 submitted 14 April, 2025; originally announced April 2025.

  2. arXiv:2501.11804  [pdf, other

    stat.ME

    Paradise of Forking Paths: Revisiting the Adaptive Data Analysis Problem

    Authors: Amir Hossein Hadavi, Mohammad M. Mojahedian, Mohammad Reza Aref

    Abstract: The Adaptive Data Analysis (ADA) problem, where an analyst interacts with a dataset through statistical queries, is often studied under the assumption of adversarial analyst behavior. To decrease this gap, we propose a revised model of ADA that accounts for more constructive interactions between the analysts and the data, where the goal is to enhance inference accuracy. Specifically, we focus on d… ▽ More

    Submitted 20 January, 2025; originally announced January 2025.

  3. arXiv:2411.15948  [pdf, other

    cs.HC

    Over-the-Air Federated Adaptive Data Analysis: Preserving Accuracy via Opportunistic Differential Privacy

    Authors: Amir Hossein Hadavi, Mohammad M. Mojahedian, Mohammad Reza Aref

    Abstract: Adaptive data analysis (ADA) involves a dynamic interaction between an analyst and a dataset owner, where the analyst submits queries sequentially, adapting them based on previous answers. This process can become adversarial, as the analyst may attempt to overfit by targeting non-generalizable patterns in the data. To counteract this, the dataset owner introduces randomization techniques, such as… ▽ More

    Submitted 18 January, 2025; v1 submitted 24 November, 2024; originally announced November 2024.

  4. arXiv:2410.17000  [pdf, ps, other

    cs.CR cs.IT

    Beyond Yao's Millionaires: Secure Multi-Party Computation of Non-Polynomial Functions

    Authors: Seyed Reza Hoseini Najarkolaei, Mohammad Mahdi Mojahedian, Mohammad Reza Aref

    Abstract: In this paper, we present an unconditionally secure $N$-party comparison scheme based on Shamir secret sharing, utilizing the binary representation of private inputs to determine the $\max$ without disclosing any private inputs or intermediate results. Specifically, each party holds a private number and aims to ascertain the greatest number among the $N$ available private numbers without revealing… ▽ More

    Submitted 22 October, 2024; originally announced October 2024.

    Comments: 11 pages, 4 figures

  5. arXiv:2410.13883  [pdf, other

    cs.CV cs.AI cs.HC cs.LG

    Transformers Utilization in Chart Understanding: A Review of Recent Advances & Future Trends

    Authors: Mirna Al-Shetairy, Hanan Hindy, Dina Khattab, Mostafa M. Aref

    Abstract: In recent years, interest in vision-language tasks has grown, especially those involving chart interactions. These tasks are inherently multimodal, requiring models to process chart images, accompanying text, underlying data tables, and often user queries. Traditionally, Chart Understanding (CU) relied on heuristics and rule-based systems. However, recent advancements that have integrated transfor… ▽ More

    Submitted 5 October, 2024; originally announced October 2024.

  6. arXiv:2403.08068  [pdf, other

    cs.CR cs.DC

    SCALHEALTH: Scalable Blockchain Integration for Secure IoT Healthcare Systems

    Authors: Mehrzad Mohammadi, Reza Javan, Mohammad Beheshti-Atashgah, Mohammad Reza Aref

    Abstract: Internet of Things (IoT) devices are capable of allowing for far-reaching access to and evaluation of patient data to monitor health and diagnose from a distance. An electronic healthcare system that checks patient data, prepares medicines and provides financial assistance is necessary. Providing safe data transmission, monitoring, decentralization, preserving patient privacy, and maintaining conf… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

  7. arXiv:2402.17342  [pdf, other

    cs.CR cs.DC

    A Scalable Multi-Layered Blockchain Architecture for Enhanced EHR Sharing and Drug Supply Chain Management

    Authors: Reza Javan, Mehrzad Mohammadi, Mohammad Beheshti-Atashgah, Mohammad Reza Aref

    Abstract: In recent years, the healthcare sector's transition to digital platforms has intensified concerns over data security, privacy, and scalability. Blockchain technology offers a decentralized, secure, and immutable solution to these challenges. This paper presents a scalable, multi-layered blockchain architecture for secure Electronic Health Record (EHR) sharing and drug supply chain management. The… ▽ More

    Submitted 9 December, 2024; v1 submitted 27 February, 2024; originally announced February 2024.

  8. arXiv:2304.12606  [pdf, ps, other

    cs.IT

    Output Statistics of Random Binning: Tsallis Divergence and Its Applications

    Authors: Masoud Kavian, Mohammad Mahdi Mojahedian, Mohammad Hossein Yassaee, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: Random binning is a widely used technique in information theory with diverse applications. In this paper, we focus on the output statistics of random binning (OSRB) using the Tsallis divergence $T_α$. We analyze all values of $α\in (0, \infty)\cup\{\infty\}$ and consider three scenarios: (i) the binned sequence is generated i.i.d., (ii) the sequence is randomly chosen from an $ε$-typical set, and… ▽ More

    Submitted 22 November, 2024; v1 submitted 25 April, 2023; originally announced April 2023.

  9. arXiv:2304.03538  [pdf, other

    cs.LG cs.CR

    Adjustable Privacy using Autoencoder-based Learning Structure

    Authors: Mohammad Ali Jamshidi, Hadi Veisi, Mohammad Mahdi Mojahedian, Mohammad Reza Aref

    Abstract: Inference centers need more data to have a more comprehensive and beneficial learning model, and for this purpose, they need to collect data from data providers. On the other hand, data providers are cautious about delivering their datasets to inference centers in terms of privacy considerations. In this paper, by modifying the structure of the autoencoder, we present a method that manages the uti… ▽ More

    Submitted 7 April, 2023; originally announced April 2023.

  10. Combining Blockchain and IOT for Decentralized Healthcare Data Management

    Authors: Sajad Meisami, Sadaf Meisami, Melina Yousefi, Mohammad Reza Aref

    Abstract: The emergence of the Internet of Things (IoT) has resulted in a significant increase in research on e-health. As the amount of patient data grows, it has become increasingly challenging to protect patients' privacy. Patient data is commonly stored in the cloud, making it difficult for users to control and protect their information. Moreover, the recent rise in security and surveillance breaches in… ▽ More

    Submitted 31 March, 2023; originally announced April 2023.

    Comments: 17 pages, 1 figures, 3 table. arXiv admin note: substantial text overlap with arXiv:2109.14812

    Journal ref: International Journal on Cryptography and Information Security (IJCIS), Vol. 13, No.1, March 2023, Page 35-50

  11. arXiv:2203.07355  [pdf, ps, other

    cs.IT

    Information-Theoretic Secure and Private Voting System

    Authors: Seyed Reza Hoseini Najarkolaei, Narges Kazempour, Hasti Rostami, Mohammad Reza Aref

    Abstract: In this paper, we present a private voting system that consists of N authorized voters who may vote to one of the K candidates or vote abstain. Each voter wants to compute the final tally while staying private and robust against malicious voters, who try to gain information about the vote of the other voters beyond the final result, or send incorrect information to affect the final tally. We desig… ▽ More

    Submitted 14 March, 2022; originally announced March 2022.

    Comments: 13 pages

  12. arXiv:2201.06348  [pdf

    cs.CL cs.AI

    Chatbot System Architecture

    Authors: Moataz Mohammed, Mostafa M. Aref

    Abstract: The conversational agents is one of the most interested topics in computer science field in the recent decade. Which can be composite from more than one subject in this field, which you need to apply Natural Language Processing Concepts and some Artificial Intelligence Techniques such as Deep Learning methods to make decision about how should be the response. This paper is dedicated to discuss the… ▽ More

    Submitted 17 January, 2022; originally announced January 2022.

  13. Using Blockchain to Achieve Decentralized Privacy In IoT Healthcare

    Authors: Sajad Meisami, Mohammad Beheshti-Atashgah, Mohammad Reza Aref

    Abstract: With the advent of the Internet of Things (IoT), e-health has become one of the main topics of research. Due to the sensitivity of patient information, patient privacy seems challenging. Nowadays, patient data is usually stored in the cloud in healthcare programs, making it difficult for users to have enough control over their data. The recent increment in announced cases of security and surveilla… ▽ More

    Submitted 29 September, 2021; originally announced September 2021.

    Comments: 6 pages

    Journal ref: International Journal on Cybernetics & Informatics (IJCI) Vol. 12, No.2, April 2023, Page 97-108

  14. arXiv:2107.10133  [pdf, other

    cs.CR

    HUAP: Practical Attribute-based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices

    Authors: Mostafa Chegenizadeh, Mohammad Ali, Javad Mohajeri, Mohammad Reza Aref

    Abstract: Attribute-based encryption (ABE) is a promising cryptographic mechanism for providing confidentiality and fine-grained access control in the cloud-based area. However, due to high computational overhead, common ABE schemes are not suitable for resource-constrained devices. Moreover, data owners should be able to update their defined access policies efficiently, and in some cases, applying hidden a… ▽ More

    Submitted 21 July, 2021; originally announced July 2021.

    Comments: This paper is an extension of work presented in ISCISC 2019

  15. arXiv:2103.12379  [pdf, other

    cs.RO cs.LG eess.SY

    Neural Network Controller for Autonomous Pile Loading Revised

    Authors: Wenyan Yang, Nataliya Strokina, Nikolay Serbenyuk, Joni Pajarinen, Reza Ghabcheloo, Juho Vihonen, Mohammad M. Aref, Joni-Kristian Kämäräinen

    Abstract: We have recently proposed two pile loading controllers that learn from human demonstrations: a neural network (NNet) [1] and a random forest (RF) controller [2]. In the field experiments the RF controller obtained clearly better success rates. In this work, the previous findings are drastically revised by experimenting summer time trained controllers in winter conditions. The winter experiments re… ▽ More

    Submitted 23 March, 2021; originally announced March 2021.

    Comments: 7 pages

  16. arXiv:2102.05695  [pdf, other

    cs.IT

    Learning under Distribution Mismatch and Model Misspecification

    Authors: Saeed Masiha, Amin Gohari, Mohammad Hossein Yassaee, Mohammad Reza Aref

    Abstract: We study learning algorithms when there is a mismatch between the distributions of the training and test datasets of a learning algorithm. The effect of this mismatch on the generalization error and model misspecification are quantified. Moreover, we provide a connection between the generalization error and the rate-distortion theory, which allows one to utilize bounds from the rate-distortion the… ▽ More

    Submitted 10 August, 2022; v1 submitted 10 February, 2021; originally announced February 2021.

    Comments: 25 pages, 4 figures

  17. arXiv:2101.00109  [pdf, other

    cs.IT

    Achievable Rates for Binary Two-hop Channel with Energy Harvesting Relay and Finite Battery

    Authors: Ali H. Abdollahi Bafghi, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: We study the problem of joint information and energy transfer in a binary two-hop channel with an energy harvesting relay. We consider a finite battery size at the relay and energy loss in transmitting energy. In other words, to be able to send an energy-contained symbol, the relay must receive multiple energy-contained symbols. Thus, we face a kind of channel with memory. We model the energy save… ▽ More

    Submitted 28 September, 2021; v1 submitted 31 December, 2020; originally announced January 2021.

    Comments: arXiv admin note: text overlap with arXiv:1704.04149

  18. arXiv:2004.04985  [pdf, other

    cs.IT cs.CR

    Coded Secure Multi-Party Computation for Massive Matrices with Adversarial Nodes

    Authors: Seyed Reza Hoseini Najarkolaei, Mohammad Ali Maddah-Ali, Mohammad Reza Aref

    Abstract: In this work, we consider the problem of secure multi-party computation (MPC), consisting of $Γ$ sources, each has access to a large private matrix, $N$ processing nodes or workers, and one data collector or master. The master is interested in the result of a polynomial function of the input matrices. Each source sends a randomized functions of its matrix, called as its share, to each worker. The… ▽ More

    Submitted 10 April, 2020; originally announced April 2020.

    Comments: 41 Pages

  19. arXiv:1906.03929  [pdf, ps, other

    cs.IT

    On the Secrecy Performance of NOMA Systems with both External and Internal Eavesdroppers

    Authors: Milad Abolpour, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: Sharing resource blocks in NOMA systems provides more opportunity to the internal users to overhear the messages of the other users. Therefore, some sort of secrecy against the internal users in addition to the external eavesdroppers must be provided. In this paper, we investigate the secrecy performance of a two-user NOMA system in existence of the external and internal passive eavesdroppers, whe… ▽ More

    Submitted 10 June, 2019; originally announced June 2019.

  20. arXiv:1902.00948  [pdf, ps, other

    cs.IT

    Outage Performance in Secure Cooperative NOMA

    Authors: Milad Abolpour, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: Enabling cooperation in a NOMA system is a promising approach to improve its performance. In this paper, we study the cooperation in a secure NOMA system, where the legitimate users are distributed uniformly in the network and the eavesdroppers are distributed according to a homogeneous Poisson point process. We consider a cooperative NOMA scheme (two users are paired as strong and weak users) in… ▽ More

    Submitted 13 March, 2019; v1 submitted 3 February, 2019; originally announced February 2019.

  21. arXiv:1901.05927  [pdf, other

    cs.IT

    Fundamental Limits of Private User Authentication

    Authors: Narges Kazempour, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: Most of the security services in the connected world of cyber-physical systems necessitate authenticating a large number of nodes privately. In this paper, the private authentication problem is considered which consists of a certificate authority, a verifier (or some verifiers), many legitimate users (provers), and an arbitrary number of attackers. Each legitimate user wants to be authenticated (u… ▽ More

    Submitted 12 September, 2022; v1 submitted 17 January, 2019; originally announced January 2019.

    Comments: 15 pages, 4 figures

  22. arXiv:1805.08026  [pdf, ps, other

    cs.IT quant-ph

    A Correlation Measure Based on Vector-Valued $L_p$-Norms

    Authors: Mohammad Mahdi Mojahedian, Salman Beigi, Amin Gohari, Mohammad Hossein Yassaee, Mohammad Reza Aref

    Abstract: In this paper, we introduce a new measure of correlation for bipartite quantum states. This measure depends on a parameter $α$, and is defined in terms of vector-valued $L_p$-norms. The measure is within a constant of the exponential of $α$-Rényi mutual information, and reduces to the trace norm (total variation distance) for $α=1$. We will prove some decoupling type theorems in terms of this meas… ▽ More

    Submitted 21 May, 2018; originally announced May 2018.

    Comments: 41 pages

  23. arXiv:1803.00532  [pdf

    cs.RO

    Reconfigurable Manipulator Simulation for Robotics and Multimodal Machine Learning Application: Aaria

    Authors: Arttu Hautakoski, Mohammad M. Aref, Jouni Mattila

    Abstract: This paper represents a systematic way for generation of Aaria, a simulated model for serial manipulators for the purpose of kinematic or dynamic analysis with a vast variety of structures based on Simulink SimMechanics. The proposed model can receive configuration parameters, for instance in accordance with modified Denavit-Hartenberg convention, or trajectories for its base or joints for structu… ▽ More

    Submitted 1 March, 2018; originally announced March 2018.

    Comments: preprint before submission to conference: 2018 IEEE International Conference on Automation Science and Engineering , 7 pages

  24. arXiv:1712.07672  [pdf

    cs.CR cs.IT

    PKC-PC: A Variant of the McEliece Public Key Cryptosystem based on Polar Codes

    Authors: Reza Hooshmand, Masoumeh Koochak Shooshtari, Mohammad Reza Aref

    Abstract: Polar codes are novel and efficient error correcting codes with low encoding and decoding complexities. These codes have a channel dependent generator matrix which is determined by the code dimension, code length and transmission channel parameters. This paper studies a variant of the McEliece public key cryptosystem based on polar codes, called "PKC-PC". Due to the fact that the structure of pola… ▽ More

    Submitted 20 December, 2017; originally announced December 2017.

  25. arXiv:1711.08570  [pdf

    cs.CR

    Key management system for WSNs based on hash functions and elliptic curve cryptography

    Authors: Hamzeh Ghasemzadeh, Ali Payandeh, Mohammad Reza Aref

    Abstract: Due to hostile environment and wireless communication channel, security mechanisms are essential for wireless sensor networks (WSNs). Existence of a pair of shared key is a prerequisite for many of these security mechanisms; a task that key management system addresses. Recently, an energy efficient method based on public key cryptography (PKC) was proposed. We analyze this protocol and show that i… ▽ More

    Submitted 22 November, 2017; originally announced November 2017.

    Comments: 9 pages, 7 figures, 5 tables, 2016 1st International Conference on New Research Achievements in Electrical and Computer Engineering

  26. arXiv:1711.04611  [pdf, ps, other

    cs.IT

    A Joint Encryption-Encoding Scheme Using QC-LDPC Codes Based on Finite Geometry

    Authors: Hossein Khayami, Taraneh Eghlidos, Mohammad Reza Aref

    Abstract: Joint encryption-encoding schemes have been released to fulfill both reliability and security desires in a single step. Using Low Density Parity Check (LDPC) codes in joint encryption-encoding schemes, as an alternative to classical linear codes, would shorten the key size as well as improving error correction capability. In this article, we present a joint encryption-encoding scheme using Quasi C… ▽ More

    Submitted 21 February, 2019; v1 submitted 13 November, 2017; originally announced November 2017.

    Comments: 21 pages, 2 figures

  27. arXiv:1705.00726  [pdf, other

    cs.MM

    Optimum Decoder for Multiplicative Spread Spectrum Image Watermarking with Laplacian Modeling

    Authors: Nematollah Zarmehi, Mohammad Reza Aref

    Abstract: This paper investigates the multiplicative spread spectrum watermarking method for the image. The information bit is spreaded into middle-frequency Discrete Cosine Transform (DCT) coefficients of each block of an image using a generated pseudo-random sequence. Unlike the conventional signal modeling, we suppose that both signal and noise are distributed with Laplacian distribution because the samp… ▽ More

    Submitted 1 May, 2017; originally announced May 2017.

  28. arXiv:1704.04149  [pdf, other

    cs.IT

    Joint Transfer of Energy and Information in a Two-hop Relay Channel

    Authors: Ali H. Abdollahi Bafghi, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: We study the problem of joint information and energy transfer in a two-hop channel with a Radio frequency (RF) energy harvesting relay. We consider a finite battery size at the relay and deterministic energy loss in transmitting energy. In other words, to be able to send an energy-contained symbol, the relay must receive multiple energy-contained symbols. Thus, we face a kind of channel with memor… ▽ More

    Submitted 13 April, 2017; originally announced April 2017.

  29. arXiv:1701.05608  [pdf

    cs.CR

    A Hybrid DOS-Tolerant PKC-Based Key Management System for WSNs

    Authors: Hamzeh Ghasemzadeh, Ali Payandeh, Mohammad Reza Aref

    Abstract: Security is a critical and vital task in wireless sensor networks, therefore different key management systems have been proposed, many of which are based on symmetric cryptography. Such systems are very energy efficient, but they lack some other desirable characteristics. On the other hand, systems based on public key cryptography have those desirable characteristics, but they consume more energy.… ▽ More

    Submitted 19 January, 2017; originally announced January 2017.

    Comments: Submitted journal paper

  30. arXiv:1701.05392  [pdf, other

    cs.IT

    On Optimal Online Algorithms for Energy Harvesting Systems with Continuous Energy and Data Arrivals

    Authors: Milad Rezaee, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: Energy harvesting (EH) has been developed to extend the lifetimes of energy-limited communication systems. In this letter, we consider a single-user EH communication system, in which both of the arrival data and the harvested energy curves are modeled as general functions. Unlike most of the works in the field, we investigate the online algorithms which only acquire the causal information of the a… ▽ More

    Submitted 19 January, 2017; originally announced January 2017.

    Comments: This paper has been submitted to IEEE Wireless Communications Letters

  31. arXiv:1612.09496  [pdf, other

    cs.IT

    Optimal Transmission Policies for Multi-hop Energy Harvesting Systems

    Authors: Milad Rezaee, Mahtab Mirmohseni, Vaneet Aggarwal, Mohammad Reza Aref

    Abstract: In this paper, we consider a multi-hop energy harvesting (EH) communication system in a full-duplex mode, where arrival data and harvested energy curves in the source and the relays are modeled as general functions. This model includes the EH system with discrete arrival processes as a special case. We investigate the throughput maximization problem considering minimum utilized energy in the sourc… ▽ More

    Submitted 30 December, 2016; originally announced December 2016.

    Comments: paper has been submitted to IEEE Transactions on Wireless Communications

  32. arXiv:1609.04586  [pdf, ps, other

    cs.IT

    On the Equivalency of Reliability and Security Metrics for Wireline Networks

    Authors: Mohammad Mahdi Mojahedian, Amin Gohari, Mohammad Reza Aref

    Abstract: In this paper, we show the equivalency of weak and strong secrecy conditions for a large class of secure network coding problems. When we restrict to linear operations, we show the equivalency of "perfect secrecy and zero-error constraints" with "weak secrecy and $ε$-error constraints".

    Submitted 15 September, 2016; originally announced September 2016.

    Comments: 21 pages, 2 figures

  33. arXiv:1605.05693  [pdf, ps, other

    cs.IT

    Capacity of the State-Dependent Wiretap Channel: Secure Writing on Dirty Paper

    Authors: Hamid G. Bafghi, Babak Seyfe, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: In this paper we consider the State-Dependent Wiretap Channel (SD-WC). As the main idea, we model the SD-WC as a Cognitive Interference Channel (CIC), in which the primary receiver acts as an eavesdropper for the cognitive transmitter's message. By this point of view, the Channel State Information (CSI) in SD-WC plays the role of the primary user's message in CIC which can be decoded at the eavesd… ▽ More

    Submitted 18 May, 2016; originally announced May 2016.

    Comments: Submitted to: IEEE Transaction on Forensics and Security

  34. arXiv:1605.04042  [pdf, ps, other

    cs.IT

    Sum Degrees of Freedom of the $K$-user Interference Channel with Blind CSI

    Authors: Milad Johnny, Mohammad Reza Aref

    Abstract: In this paper, we consider the problem of the interference alignment for the $K$-user SISO interference channel (IC) with blind channel state information (CSI) at transmitters. Our achievement in contrast to the traditional $K-$user interference alignment (IA) scheme has more practical notions. In this case, every receiver is equipped with one reconfigurable antenna which tries to place its desire… ▽ More

    Submitted 13 May, 2016; originally announced May 2016.

    Comments: arXiv admin note: substantial text overlap with arXiv:1602.03328

  35. arXiv:1604.04818  [pdf, ps, other

    cs.IT cs.CR

    Secrecy Capacity in Large Cooperative Networks in Presence of Eavesdroppers with Unknown Locations

    Authors: Amir Hossein Hadavi, Narges Kazempour, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: In this paper, an extended large wireless network under the secrecy constraint is considered. In contrast to works which use idealized assumptions, a more realistic network situation with unknown eavesdroppers locations is investigated: the legitimate users only know their own Channel State Information (CSI), not the eavesdroppers CSI. Also, the network is analyzed by taking in to account the effe… ▽ More

    Submitted 16 April, 2016; originally announced April 2016.

  36. arXiv:1602.03328  [pdf, ps, other

    cs.IT

    Degrees of Freedom Rate Region of the $K$-user Interference Channel with Blind CSIT Using Staggered Antenna Switching

    Authors: Milad Johnny, Mohammad Reza Aref

    Abstract: In this paper, we consider the problem of the interference alignment for the $K$-user SISO interference channel with blind channel state information at transmitters (CSIT). Our achievement in contrast to popular $K-$user interference alignment (IA) scheme has more practical notions. In this case every receiver is equipped with one reconfigurable antenna which tries to place its desired signal in a… ▽ More

    Submitted 10 February, 2016; originally announced February 2016.

    Comments: 15 pages, 4 figures, This paper submitted to IEEE Transactions on Wireless Communications and partially IWCIT 2016. arXiv admin note: text overlap with arXiv:1408.6427 by other authors

  37. arXiv:1512.01751  [pdf, ps, other

    cs.IT

    Interference Alignment for the K-user Interference Channel with Imperfect CSI

    Authors: Milad Johnny, Mohammad Reza Aref

    Abstract: In this paper we explore the information-theoretic aspects of interference alignment and its relation to channel state information (CSI). For the $K-$user interference channel using different changing patterns between different users, we propose several methods to align some parts of interferences and to increase what is achieved by time sharing method. For more practical case when all the channel… ▽ More

    Submitted 6 December, 2015; originally announced December 2015.

    Comments: 41 pages, 7 figures

  38. arXiv:1511.07168  [pdf, ps, other

    cs.IT

    On The Secrecy of the Cognitive Interference Channel with Partial Channel States

    Authors: Hamid G. Bafghi, Babak Seyfe, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: The secrecy problem in the state-dependent cognitive interference channel is considered in this paper. In our model, there are a primary and a secondary (cognitive) transmitter-receiver pairs, in which the cognitive transmitter has the message of the primary one as side information. In addition, the channel is affected by a channel state sequence which is estimated partially at the cognitive trans… ▽ More

    Submitted 18 May, 2016; v1 submitted 23 November, 2015; originally announced November 2015.

    Comments: 14 pages, 3 figures, submitted to TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (ETT)

  39. arXiv:1506.04079  [pdf, other

    cs.IT

    Energy Harvesting Systems with Continuous Energy and Data Arrivals: the Optimal Offline and a Heuristic Online Algorithms

    Authors: Milad Rezaee, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: Energy harvesting has been developed as an effective technology for communication systems in order to extend the lifetime of these systems. In this work, we consider a singleuser energy harvesting wireless communication system, in which arrival data and harvested energy curves are modeled as continuous functions. For the single-user model, our first goal is to find an offline algorithm, which maxi… ▽ More

    Submitted 22 January, 2016; v1 submitted 12 June, 2015; originally announced June 2015.

  40. Perfectly Secure Index Coding

    Authors: Mohammad Mahdi Mojahedian, Mohammad Reza Aref, Amin Gohari

    Abstract: In this paper, we investigate the index coding problem in the presence of an eavesdropper. Messages are to be sent from one transmitter to a number of legitimate receivers who have side information about the messages, and share a set of secret keys with the transmitter. We assume perfect secrecy, meaning that the eavesdropper should not be able to retrieve any information about the message set. We… ▽ More

    Submitted 30 December, 2015; v1 submitted 17 April, 2015; originally announced April 2015.

    Comments: 25 pages, 5 figures, submitted to the IEEE Transactions on Information Theory

  41. arXiv:1503.04169  [pdf, other

    cs.DB cs.DS

    Join Processing for Graph Patterns: An Old Dog with New Tricks

    Authors: Dung Nguyen, Molham Aref, Martin Bravenboer, George Kollias, Hung Q. Ngo, Christopher Ré, Atri Rudra

    Abstract: Join optimization has been dominated by Selinger-style, pairwise optimizers for decades. But, Selinger-style algorithms are asymptotically suboptimal for applications in graphic analytics. This suboptimality is one of the reasons that many have advocated supplementing relational engines with specialized graph processing engines. Recently, new join algorithms have been discovered that achieve optim… ▽ More

    Submitted 17 March, 2015; v1 submitted 13 March, 2015; originally announced March 2015.

    ACM Class: H.2; E.1; H.3.4

  42. arXiv:1409.2100  [pdf, ps, other

    cs.IT

    Multi layer Gelfand Pinsker Strategies for the Generalized Multiple Access Channel

    Authors: Mohammad Javad Emadi, Majid Nasiri Khormuji, Mikael Skoglund, Mohammad Reza Aref

    Abstract: We study a two-user state-dependent generalized multiple-access channel (GMAC) with correlated states. It is assumed that each encoder has \emph{noncausal} access to channel state information (CSI). We develop an achievable rate region by employing rate-splitting, block Markov encoding, Gelfand--Pinsker multicoding, superposition coding and joint typicality decoding. In the proposed scheme, the en… ▽ More

    Submitted 7 September, 2014; originally announced September 2014.

    Comments: 26 pages, 8 pages

  43. Compound Multiple Access Channel with Confidential Messages

    Authors: Hassan Zivari-Fard, Bahareh Akhbari, Mahmoud Ahmadian-Attari, Mohammad Reza Aref

    Abstract: In this paper, we study the problem of secret communication over a Compound Multiple Access Channel (MAC). In this channel, we assume that one of the transmitted messages is confidential that is only decoded by its corresponding receiver and kept secret from the other receiver. For this proposed setting (compound MAC with confidential messages), we derive general inner and outer bounds on the secr… ▽ More

    Submitted 24 February, 2014; originally announced February 2014.

    Comments: Accepted at IEEE ICC 2014. arXiv admin note: substantial text overlap with arXiv:1402.4799

  44. arXiv:1402.4799  [pdf, other

    cs.IT

    Multiple Access Channel with Common Message and Secrecy constraint

    Authors: Hassan Zivari-Fard, Bahareh Akhbari, Mahmoud Ahmadian-Attari, Mohammad Reza Aref

    Abstract: In this paper, we study the problem of secret communication over a multiple-access channel with a common message. Here, we assume that two transmitters have confidential messages, which must be kept secret from the wiretapper (the second receiver), and both of them have access to a common message which can be decoded by the two receivers. We call this setting as Multiple-Access Wiretap Channel wit… ▽ More

    Submitted 12 July, 2016; v1 submitted 19 February, 2014; originally announced February 2014.

    Comments: 11 pages, 7 figures, Accepted in IET Communications

  45. arXiv:1307.6927  [pdf

    cs.CR cs.IT

    Secret Key Cryptosystem based on Polar Codes over Binary Erasure Channel

    Authors: Reza Hooshmand, Masoumeh Koochak Shooshtari, Mohammad Reza Aref

    Abstract: This paper proposes an efficient secret key cryptosystem based on polar codes over Binary Erasure Channel. We introduce a method, for the first time to our knowledge, to hide the generator matrix of the polar codes from an attacker. In fact, our main goal is to achieve secure and reliable communication using finite-length polar codes. The proposed cryptosystem has a significant security advantage… ▽ More

    Submitted 1 August, 2013; v1 submitted 26 July, 2013; originally announced July 2013.

    Comments: This paper was submitted to ISCISC 2013 on 19 May 2013 and accepted on 25 July 2013

  46. arXiv:1305.5901  [pdf, other

    cs.IT

    Simulation of a Channel with Another Channel

    Authors: Farzin Haddadpour, Mohammad Hossein Yassaee, Salman Beigi, Amin Gohari, Mohammad Reza Aref

    Abstract: In this paper, we study the problem of simulating a DMC channel from another DMC channel under an average-case and an exact model. We present several achievability and infeasibility results, with tight characterizations in special cases. In particular for the exact model, we fully characterize when a BSC channel can be simulated from a BEC channel when there is no shared randomness. We also provid… ▽ More

    Submitted 1 December, 2016; v1 submitted 25 May, 2013; originally announced May 2013.

    Comments: 31 pages, 10 figures, and some parts of this work were published at ITW 2013

  47. arXiv:1305.3778  [pdf, other

    cs.IT

    Empirical Coordination in a Triangular Multiterminal Network

    Authors: Ali Bereyhi, Mohsen Bahrami, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: In this paper, we investigate the problem of the empirical coordination in a triangular multiterminal network. A triangular multiterminal network consists of three terminals where two terminals observe two external i.i.d correlated sequences. The third terminal wishes to generate a sequence with desired empirical joint distribution. For this problem, we derive inner and outer bounds on the empiric… ▽ More

    Submitted 16 May, 2013; originally announced May 2013.

    Comments: Accepted in ISIT 2013

  48. arXiv:1303.0696  [pdf, ps, other

    cs.IT

    A Technique for Deriving One-Shot Achievability Results in Network Information Theory

    Authors: Mohammad Hossein Yassaee, Mohammad Reza Aref, Amin Gohari

    Abstract: This paper proposes a novel technique to prove a one-shot version of achievability results in network information theory. The technique is not based on covering and packing lemmas. In this technique, we use an stochastic encoder and decoder with a particular structure for coding that resembles both the ML and the joint-typicality coders. Although stochastic encoders and decoders do not usually enh… ▽ More

    Submitted 4 March, 2013; originally announced March 2013.

    Comments: A short version has been submitted to ISIT 2013

  49. arXiv:1303.0695  [pdf, ps, other

    cs.IT

    Non-Asymptotic Output Statistics of Random Binning and Its Applications

    Authors: Mohammad Hossein Yassaee, Mohammad Reza Aref, Amin Gohari

    Abstract: In this paper we develop a finite blocklength version of the Output Statistics of Random Binning (OSRB) framework. The framework is shown to be optimal in the point-to-point case. New second order regions for broadcast channel and wiretap channel with strong secrecy criterion are derived.

    Submitted 4 March, 2013; originally announced March 2013.

    Comments: A shot version has been submitted to ISIT 2013

  50. arXiv:1301.5142  [pdf, other

    cs.CR

    Key agreement over a 3-receiver broadcast channel

    Authors: Mohsen Bahrami, Ali Bereyhi, Sadaf Salehkalaibar, Mohammad Reza Aref

    Abstract: In this paper, we consider the problem of secret key agreement in state-dependent 3-receiver broadcast channels. In the proposed model, there are two legitimate receivers, an eavesdropper and a transmitter where the channel state information is non-causally available at the transmitter. We consider two setups. In the first setup, the transmitter tries to agree on a common key with the legitimate r… ▽ More

    Submitted 16 May, 2013; v1 submitted 22 January, 2013; originally announced January 2013.

    Comments: Accepted in IWCIT 2013