Skip to main content

Showing 1–50 of 67 results for author: Mirmohseni, M

.
  1. arXiv:2504.16613  [pdf, ps, other

    eess.SP

    UAV-Mounted IRS (UMI) in the Presence of Hovering Fluctuations: 3D Pattern Characterization and Performance Analysis

    Authors: Mohammad Javad Zakavi, Mahtab Mirmohseni, Farid Ashtiani, Masoumeh Nasiri-Kenari

    Abstract: This paper investigates unmanned aerial vehicle (UAV)-mounted intelligent reflecting surfaces (IRS) to leverage the benefits of this technology for future communication networks, such as 6G. Key advantages include enhanced spectral and energy efficiency, expanded network coverage, and flexible deployment. One of the main challenges in employing UAV-mounted IRS (UMI) technology is the random fluctu… ▽ More

    Submitted 10 June, 2025; v1 submitted 23 April, 2025; originally announced April 2025.

    Comments: 14 pages, 8 figures

  2. arXiv:2504.09674  [pdf, ps, other

    cs.IT eess.SP

    On Stochastic Performance Analysis of Secure Integrated Sensing and Communication Networks

    Authors: Marziyeh Soltani, Mahtab Mirmohseni, Rahim Tafazolli

    Abstract: This paper analyzes the stochastic security performance of a multiple-input multiple-output (MIMO) integrated sensing and communication (ISAC) system in a downlink scenario. A base station (BS) transmits a multi-functional signal to simultaneously communicate with a user, sense a target angular location, and counteract eavesdropping threats. The system includes a passive single-antenna communicati… ▽ More

    Submitted 13 April, 2025; originally announced April 2025.

  3. arXiv:2504.09437  [pdf, other

    cs.CR eess.SP

    PLS-Assisted Offloading for Edge Computing-Enabled Post-Quantum Security in Resource-Constrained Devices

    Authors: Hamid Amiriara, Mahtab Mirmohseni, Rahim Tafazolli

    Abstract: With the advent of post-quantum cryptography (PQC) standards, it has become imperative for resource-constrained devices (RCDs) in the Internet of Things (IoT) to adopt these quantum-resistant protocols. However, the high computational overhead and the large key sizes associated with PQC make direct deployment on such devices impractical. To address this challenge, we propose an edge computing-enab… ▽ More

    Submitted 13 April, 2025; originally announced April 2025.

    Comments: 4 figures

  4. arXiv:2501.17476  [pdf, other

    cs.IT eess.SP

    Hybrid Channel- and Coding-Based Challenge-Response Physical-Layer Authentication

    Authors: Laura Crosara, Mahtab Mirmohseni, Stefano Tomasin

    Abstract: This letter proposes a new physical layer authentication mechanism operating at the physical layer of a communication system where the receiver has partial control of the channel conditions (e.g., using an intelligent reflecting surface). We aim to exploit both instantaneous channel state information (CSI) and a secret shared key for authentication. This is achieved by both transmitting an identif… ▽ More

    Submitted 29 January, 2025; originally announced January 2025.

    Comments: Submitted to IEEE Wireless Communications Letters

  5. arXiv:2410.15290  [pdf, ps, other

    cs.IT

    On the size of error ball in DNA storage channels

    Authors: Aryan Abbasian, Mahtab Mirmohseni, Masoumeh Nasiri Kenari

    Abstract: Recent experiments have demonstrated the feasibility of storing digital information in macromolecules such as DNA and protein. However, the DNA storage channel is prone to errors such as deletions, insertions, and substitutions. During the synthesis and reading phases of DNA strings, many noisy copies of the original string are generated. The problem of recovering the original string from these no… ▽ More

    Submitted 20 October, 2024; originally announced October 2024.

    Comments: 17 pages

  6. RIS-Assisted D2D Communication in the Presence of Interference: Outage Performance Analysis and DNN-Based Prediction

    Authors: Hamid Amiriara, Farid Ashtiani, Mahtab Mirmohseni, Masoumeh Nasiri-Kenari, Behrouz Maham

    Abstract: This paper analyses the performance of reconfigurable intelligent surface (RIS)-assisted device-to-device (D2D) communication systems, focusing on addressing co-channel interference, a prevalent issue due to the frequency reuse of sidelink in the underlay in-band D2D communications. In contrast to previous studies that either neglect interference or consider it only at the user, our research inves… ▽ More

    Submitted 9 October, 2024; originally announced October 2024.

    Comments: 12 pages

  7. arXiv:2410.06208  [pdf, other

    eess.SP

    A Physical Layer Security Framework for IRS-Assisted Integrated Sensing and Semantic Communication Systems

    Authors: Hamid Amiriara, Mahtab Mirmohseni, Ahmed Elzanaty, Yi Ma, Rahim Tafazolli

    Abstract: In this paper, we propose a physical layer security (PLS) framework for an intelligent reflecting surface (IRS)-assisted integrated sensing and semantic communication (ISASC) system, where a multi-antenna dual-functional semantic base station (BS) serves multiple semantic communication users (SCUs) and monitors a potentially malicious sensing target (MST) in the presence of an eavesdropper (EVE).… ▽ More

    Submitted 14 January, 2025; v1 submitted 8 October, 2024; originally announced October 2024.

    Comments: Part of this paper has been accepted at the 2025 IEEE Wireless Communications and Networking Conference, March 2025, Milan, Italy

  8. arXiv:2408.11792  [pdf, other

    cs.IT cs.LG stat.AP stat.CO

    Optical ISAC: Fundamental Performance Limits and Transceiver Design

    Authors: Alireza Ghazavi Khorasgani, Mahtab Mirmohseni, Ahmed Elzanaty

    Abstract: This paper characterizes the optimal capacity-distortion (C-D) tradeoff in an optical point-to-point system with single-input single-output (SISO) for communication and single-input multiple-output (SIMO) for sensing within an integrated sensing and communication (ISAC) framework. We consider the optimal rate-distortion (R-D) region and explore several inner (IB) and outer bounds (OB). We introduc… ▽ More

    Submitted 12 April, 2025; v1 submitted 21 August, 2024; originally announced August 2024.

    Comments: This paper is 8 pages long and includes 1 algorithm, 3 figures, and 3 tables. It has been accepted for presentation at the 2024 Global Communications Conference. For further discussion, please visit AlphaXiv or email the authors

  9. arXiv:2406.07352  [pdf, other

    cs.IT math.PR

    Stochastic Analysis of Homogeneous Wireless Networks Assisted by Intelligent Reflecting Surfaces

    Authors: Ali H. Abdollahi Bafghi, Mahtab Mirmohseni, Masoumeh Nasiri-Kenari, Behrouz Maham, Umberto Spagnolini

    Abstract: In this paper, we study the impact of the existence of multiple IRSs in a homogeneous wireless network, in which all BSs, users (U), and IRSs are spatially distributed by an independent homogeneous PPP, with density $λ_{\rm BS}\rm{[BS/m^2]}$, $λ_{\rm U}\rm{[U/m^2]}$, and $λ_{\rm IRS}\rm{[IRS/m^2]}$, respectively. We utilize a uniformly random serving strategy for BS and IRS to create stochastic sy… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

  10. arXiv:2405.04993  [pdf, ps, other

    cs.IT

    On Stochastic Fundamental Limits in a Downlink Integrated Sensing and Communication Network

    Authors: Marziyeh Soltani, Mahtab Mirmohseni, Rahim Tafazolli

    Abstract: This paper aims to analyze the stochastic performance of a multiple input multiple output (MIMO) integrated sensing and communication (ISAC) system in a downlink scenario, where a base station (BS) transmits a dual-functional radar-communication (DFRC) signal matrix, serving the purpose of transmitting communication data to the user while simultaneously sensing the angular location of a target. Th… ▽ More

    Submitted 19 October, 2024; v1 submitted 8 May, 2024; originally announced May 2024.

    Comments: arXiv admin note: text overlap with arXiv:2305.15388

  11. arXiv:2405.03361  [pdf, other

    cs.IT

    Secure Semantic Communication over Wiretap Channel

    Authors: Denis Kozlov, Mahtab Mirmohseni, Rahim Tafazolli

    Abstract: Semantic communication is a new paradigm for information transmission that integrates the essential meaning (semantics) of the message into the communication process. However, like in classic wireless communications, the open nature of wireless channels poses security risks for semantic communications. In this paper, we characterize information-theoretic limits for the secure transmission of a sem… ▽ More

    Submitted 21 October, 2024; v1 submitted 6 May, 2024; originally announced May 2024.

    Comments: Accepted for presentation at the IEEE Information Theory Workshop 2024

  12. A Novel Stochastic Model for IRS-Assisted Communication Systems Based on the Sum-Product of Nakagami-$m$ Random Variables

    Authors: Hamid Amiriara, Mahtab Mirmohseni, Farid Ashtiani, Masoumeh Nasiri-Kenari

    Abstract: This paper presents exact formulas for the probability distribution function (PDF) and moment generating function (MGF) of the sum-product of statistically independent but not necessarily identically distributed (i.n.i.d.) Nakagami-$m$ random variables (RVs) in terms of Meijer's G-function. Additionally, exact series representations are also derived for the sum of double-Nakagami RVs, providing us… ▽ More

    Submitted 18 January, 2024; v1 submitted 11 January, 2024; originally announced January 2024.

    Comments: 11 pages

  13. arXiv:2305.15388  [pdf, ps, other

    cs.IT eess.SP

    Outage Tradeoff Analysis in a Downlink Integrated Sensing and Communication Network

    Authors: Marziyeh Soltani, Mahtab Mirmohseni, Rahim Tafazolli

    Abstract: This paper aims to analyze the stochastic performance of a multiple input multiple output (MIMO) integrated sensing and communication (ISAC) system in a downlink scenario, where a base station (BS) transmits a dual-functional radar-communication (DFRC) signal matrix, serving the purpose of transmitting communication data to the user while simultaneously sensing the angular location of a target. Th… ▽ More

    Submitted 24 May, 2023; originally announced May 2023.

  14. arXiv:2304.12606  [pdf, ps, other

    cs.IT

    Output Statistics of Random Binning: Tsallis Divergence and Its Applications

    Authors: Masoud Kavian, Mohammad Mahdi Mojahedian, Mohammad Hossein Yassaee, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: Random binning is a widely used technique in information theory with diverse applications. In this paper, we focus on the output statistics of random binning (OSRB) using the Tsallis divergence $T_α$. We analyze all values of $α\in (0, \infty)\cup\{\infty\}$ and consider three scenarios: (i) the binned sequence is generated i.i.d., (ii) the sequence is randomly chosen from an $ε$-typical set, and… ▽ More

    Submitted 22 November, 2024; v1 submitted 25 April, 2023; originally announced April 2023.

  15. IRS-User Association in IRS-Aided MISO Wireless Networks: Convex Optimization and Machine Learning Approaches

    Authors: Hamid Amiriara, Farid Ashtiani, Mahtab Mirmohseni, Masoumeh Nasiri-Kenari

    Abstract: This paper concentrates on the problem of associating an intelligent reflecting surface (IRS) to multiple users in a multiple-input single-output (MISO) downlink wireless communication network. The main objective of the paper is to maximize the sum-rate of all users by solving the joint optimization problem of the IRS-user association, IRS reflection, and BS beamforming, formulated as a non-convex… ▽ More

    Submitted 29 October, 2022; originally announced October 2022.

    Comments: 10 pages, 4 figures

  16. arXiv:2210.12091  [pdf, ps, other

    cs.IT

    Physical Layer Security in Random NOMA-Enabled Heterogeneous Networks

    Authors: Elmira Shahraki, Mahtab Mirmohseni, Hengameh Keshavarz

    Abstract: The performance of physical layer secrecy approach in non-orthogonal multiple access (NOMA)-enabled heterogeneous networks (HetNets) is analyzed in this paper. A $K$-tier multi-cell HetNet is considered, comprising NOMA adopted in all tiers. The base stations, legitimate users (in a two-user NOMA setup), and passive eavesdroppers, all with single-antenna, are randomly distributed. Assuming indepen… ▽ More

    Submitted 21 October, 2022; originally announced October 2022.

  17. arXiv:2207.06032  [pdf, other

    cs.IT eess.SP

    Abnormality Detection and Localization Schemes using Molecular Communication Systems: A Survey

    Authors: Ali Etemadi, Maryam Farahnak-Ghazani, Hamidreza Arjmandi, Mahtab Mirmohseni, Masoumeh Nasiri-Kenari

    Abstract: Abnormality detection and localization (ADL) have been studied widely in wireless sensor networks (WSNs) literature, where the sensors use electromagnetic waves for communication. Molecular communication (MC) has been introduced as an alternative approach for ADL in particular areas such as healthcare, being able to tackle the shortcomings of conventional WSNs, such as invasiveness, bio-incompatib… ▽ More

    Submitted 12 November, 2022; v1 submitted 13 July, 2022; originally announced July 2022.

    Comments: *Ali Etemadi and Maryam Farahnak-Ghazani are co-first authors

  18. arXiv:2203.16641  [pdf, other

    eess.SP q-bio.MN

    Joint Sensing, Communication and Localization of a Silent Abnormality Using Molecular Diffusion

    Authors: Ladan Khaloopour, Mahtab Mirmohseni, Masoumeh Nasiri-Kenari

    Abstract: In this paper, we propose a molecular communication system to localize an abnormality in a diffusion based medium. We consider a general setup to perform joint sensing, communication and localization. This setup consists of three types of devices, each for a different task: mobile sensors for navigation and molecule releasing (for communication), fusion centers (FC)s for sampling, amplifying and f… ▽ More

    Submitted 30 March, 2022; originally announced March 2022.

  19. arXiv:2202.04696  [pdf, other

    cs.IT

    Distributed Attribute-based Private Access Control

    Authors: Amir Masoud Jafarpisheh, Mahtab Mirmohseni, Mohammad Ali Maddah-Ali

    Abstract: In attribute-based access control, users with certain verified attributes will gain access to some particular data. Concerning with privacy of the users' attributes, we study the problem of distributed attribute-based private access control (DAPAC) with multiple authorities, where each authority will learn and verify only one of the attributes. To investigate its fundamental limits, we introduce… ▽ More

    Submitted 9 February, 2022; originally announced February 2022.

  20. arXiv:2202.02307  [pdf, ps, other

    cs.IT

    Privacy-aware Distributed Hypothesis Testing in Gray-Wyner Network with Side Information

    Authors: Reza Abbasalipour, Mahtab Mirmohseni

    Abstract: The problem of distributed binary hypothesis testing in the Gray-Wyner network with side information is studied in this paper. An observer has access to a discrete memoryless and stationary source and describes its observation to two detectors via one common and two private channels. The channels are considered error-free but rate-limited. Each detector also has access to its own discrete memoryle… ▽ More

    Submitted 4 February, 2022; originally announced February 2022.

  21. arXiv:2109.09624  [pdf, other

    cs.IT

    On Achievable Degrees of Freedom for the Frequency-Selective K-User Interference Channel in the Presence of an Instantaneous Relay

    Authors: Ali H. Abdollahi Bafghi, Mahtab Mirmohseni, Masoumeh Nasiri-Kenari

    Abstract: In this paper, we study the degrees of freedom (DoF) of the frequency-selective K-user interference channel in the presence of an instantaneous relay (IR) with multiple receive and transmit antennas. We investigate two scenarios based on the IR antennas' cooperation ability. First, we assume that the IR receive and transmit antennas can coordinate with each other, where the transmitted signal of e… ▽ More

    Submitted 20 September, 2021; originally announced September 2021.

    Comments: Submitted to IEEE Transactions on Information Theory

  22. arXiv:2105.07438  [pdf, other

    eess.SP

    Theoretical Concept Study of Cooperative Abnormality Detection and Localization in Fluidic-Medium Molecular Communication

    Authors: Ladan Khaloopour, Mahtab Mirmohseni, Masoumeh Nasiri-Kenari

    Abstract: In this paper, we propose a theoretical framework for cooperative abnormality detection and localization systems by exploiting molecular communication setup. The system consists of mobile sensors in a fluidic medium, which are injected into the medium to search the environment for abnormality. Some fusion centers (FC) are placed at specific locations in the medium, which absorb all sensors arrived… ▽ More

    Submitted 16 May, 2021; originally announced May 2021.

    Comments: This paper is accepted for publication in the IEEE Sensors Journal

  23. arXiv:2105.02215  [pdf, other

    cs.IT cs.CR

    Massive MIMO-NOMA Systems Secrecy in the Presence of Active Eavesdroppers

    Authors: Marziyeh Soltani, Mahtab Mirmohseni, Panos Papadimitratos

    Abstract: Non-orthogonal multiple access (NOMA) and massive multiple-input multiple-output (MIMO) systems are highly efficient. Massive MIMO systems are inherently resistant to passive attackers (eavesdroppers), thanks to transmissions directed to the desired users. However, active attackers can transmit a combination of legitimate user pilot signals during the channel estimation phase. This way they can mi… ▽ More

    Submitted 5 May, 2021; originally announced May 2021.

  24. arXiv:2103.01568  [pdf, other

    cs.IT cs.CR

    The Capacity Region of Distributed Multi-User Secret Sharing

    Authors: Ali Khalesi, Mahtab Mirmohseni, Mohammad Ali Maddah-Ali

    Abstract: In this paper, we study the problem of distributed multi-user secret sharing, including a trusted master node, $N\in \mathbb{N}$ storage nodes, and $K$ users, where each user has access to the contents of a subset of storage nodes. Each user has an independent secret message with certain rate, defined as the size of the message normalized by the size of a storage node. Having access to the secret… ▽ More

    Submitted 2 March, 2021; originally announced March 2021.

  25. arXiv:2101.10745  [pdf, other

    cs.IT

    Interference Alignment Using Reaction in Molecular Interference Channels

    Authors: Maryam Farahnak-Ghazani, Mahtab Mirmohseni, Masoumeh Nasiri-Kenari

    Abstract: Co-channel interference (CCI) is a performance limiting factor in molecular communication (MC) systems with shared medium. Interference alignment (IA) is a promising scheme to mitigate CCI in traditional communication systems. Due to the signal-dependent noise in MC systems, the traditional IA schemes are less useful in MC systems. In this paper, we propose a novel IA scheme in molecular interfere… ▽ More

    Submitted 26 June, 2022; v1 submitted 26 January, 2021; originally announced January 2021.

  26. arXiv:2101.00109  [pdf, other

    cs.IT

    Achievable Rates for Binary Two-hop Channel with Energy Harvesting Relay and Finite Battery

    Authors: Ali H. Abdollahi Bafghi, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: We study the problem of joint information and energy transfer in a binary two-hop channel with an energy harvesting relay. We consider a finite battery size at the relay and energy loss in transmitting energy. In other words, to be able to send an energy-contained symbol, the relay must receive multiple energy-contained symbols. Thus, we face a kind of channel with memory. We model the energy save… ▽ More

    Submitted 28 September, 2021; v1 submitted 31 December, 2020; originally announced January 2021.

    Comments: arXiv admin note: text overlap with arXiv:1704.04149

  27. On Molecular Flow Velocity Meters

    Authors: Maryam Farahnak-Ghazani, Mahtab Mirmohseni, Masoumeh Nasiri-Kenari

    Abstract: Flow velocity is an important characteristic of the fluidic mediums. In this paper, we introduce a molecular based flow velocity meter consisting of a molecule releasing node and a receiver that counts these molecules. We consider both flow velocity detection and estimation problems, which are employed in different applications. For the flow velocity detection, we obtain the maximum a posteriori (… ▽ More

    Submitted 11 January, 2021; v1 submitted 5 July, 2020; originally announced July 2020.

    Comments: To be published in the IEEE Transactions on Molecular, Biological, and Multi-Scale Communications

  28. arXiv:2006.13398  [pdf, other

    cs.IT

    On the Capacity of the Joint Time and Concentration Modulation for Molecular Communications

    Authors: Farhad Mirkarimi, Mahtab Mirmohseni, Masoumeh Nasiri-Kenari

    Abstract: Most diffusion based molecular channels suffer from low information capacity due to the structure of the diffusion environment. To address this issue, this paper studies the capacity of the diffusion based molecular communication by exploiting both time and concentration level of the released molecules for information transfer. The transmitter releases molecules in one of the sub-intervals with a… ▽ More

    Submitted 23 June, 2020; originally announced June 2020.

  29. arXiv:2003.12052  [pdf, other

    stat.ML cs.CR cs.IT cs.LG

    Corella: A Private Multi Server Learning Approach based on Correlated Queries

    Authors: Hamidreza Ehteram, Mohammad Ali Maddah-Ali, Mahtab Mirmohseni

    Abstract: The emerging applications of machine learning algorithms on mobile devices motivate us to offload the computation tasks of training a model or deploying a trained one to the cloud or at the edge of the network. One of the major challenges in this setup is to guarantee the privacy of the client data. Various methods have been proposed to protect privacy in the literature. Those include (i) adding n… ▽ More

    Submitted 27 July, 2020; v1 submitted 26 March, 2020; originally announced March 2020.

    Comments: 13 pages, 9 figures, 4 tables

  30. arXiv:1907.08934  [pdf, other

    cs.IT cs.ET

    Adaptive Release Duration Modulation for Limited Molecule Production and Storage

    Authors: Ladan Khaloopour, Mahtab Mirmohseni, Masoumeh Nasiri-Kenari

    Abstract: The nature of molecular transmitter imposes some limitations on the molecule production process and its storage. As the molecules act the role of the information carriers, the limitations affect the transmission process and the system performance considerably. In this paper, we focus on the transmitter's limitations, in particular, the limited molecule production rate and the finite storage capaci… ▽ More

    Submitted 21 July, 2019; originally announced July 2019.

  31. arXiv:1906.03929  [pdf, ps, other

    cs.IT

    On the Secrecy Performance of NOMA Systems with both External and Internal Eavesdroppers

    Authors: Milad Abolpour, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: Sharing resource blocks in NOMA systems provides more opportunity to the internal users to overhear the messages of the other users. Therefore, some sort of secrecy against the internal users in addition to the external eavesdroppers must be provided. In this paper, we investigate the secrecy performance of a two-user NOMA system in existence of the external and internal passive eavesdroppers, whe… ▽ More

    Submitted 10 June, 2019; originally announced June 2019.

  32. arXiv:1902.06319  [pdf, ps, other

    cs.IT

    Private Inner Product Retrieval for Distributed Machine Learning

    Authors: Mohammad Hossein Mousavi, Mohammad Ali Maddah-Ali, Mahtab Mirmohseni

    Abstract: In this paper, we argue that in many basic algorithms for machine learning, including support vector machine (SVM) for classification, principal component analysis (PCA) for dimensionality reduction, and regression for dependency estimation, we need the inner products of the data samples, rather than the data samples themselves. Motivated by the above observation, we introduce the problem of pri… ▽ More

    Submitted 17 February, 2019; originally announced February 2019.

  33. arXiv:1902.00948  [pdf, ps, other

    cs.IT

    Outage Performance in Secure Cooperative NOMA

    Authors: Milad Abolpour, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: Enabling cooperation in a NOMA system is a promising approach to improve its performance. In this paper, we study the cooperation in a secure NOMA system, where the legitimate users are distributed uniformly in the network and the eavesdroppers are distributed according to a homogeneous Poisson point process. We consider a cooperative NOMA scheme (two users are paired as strong and weak users) in… ▽ More

    Submitted 13 March, 2019; v1 submitted 3 February, 2019; originally announced February 2019.

  34. arXiv:1901.05927  [pdf, other

    cs.IT

    Fundamental Limits of Private User Authentication

    Authors: Narges Kazempour, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: Most of the security services in the connected world of cyber-physical systems necessitate authenticating a large number of nodes privately. In this paper, the private authentication problem is considered which consists of a certificate authority, a verifier (or some verifiers), many legitimate users (provers), and an arbitrary number of attackers. Each legitimate user wants to be authenticated (u… ▽ More

    Submitted 12 September, 2022; v1 submitted 17 January, 2019; originally announced January 2019.

    Comments: 15 pages, 4 figures

  35. arXiv:1802.08965  [pdf, ps, other

    cs.IT

    Diffusion Based Molecular Communication with Limited Molecule Production Rate

    Authors: Hamid G. Bafghi, Amin Gohari, Mahtab Mirmohseni, Masoumeh Nasiri-Kenari

    Abstract: This paper studies the impact of a transmitter's molecule generation process on the capacity of a concentration based Molecular Communication (MC) system. Constraints caused by the molecule generation process affect the availability of the molecules at the transmitter. The transmitter has a storage of molecules, and should decide whether to release or save the currently produced molecules. As a re… ▽ More

    Submitted 25 February, 2018; originally announced February 2018.

  36. arXiv:1711.04677  [pdf, ps, other

    cs.IT cs.CR

    Private Function Retrieval

    Authors: Mahtab Mirmohseni, Mohammad Ali Maddah-Ali

    Abstract: The widespread use of cloud computing services raises the question of how one can delegate the processing tasks to the untrusted distributed parties without breeching the privacy of its data and algorithms. Motivated by the algorithm privacy concerns in a distributed computing system, in this paper, we introduce the private function retrieval (PFR) problem, where a user wishes to efficiently retri… ▽ More

    Submitted 15 November, 2017; v1 submitted 13 November, 2017; originally announced November 2017.

  37. arXiv:1704.04149  [pdf, other

    cs.IT

    Joint Transfer of Energy and Information in a Two-hop Relay Channel

    Authors: Ali H. Abdollahi Bafghi, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: We study the problem of joint information and energy transfer in a two-hop channel with a Radio frequency (RF) energy harvesting relay. We consider a finite battery size at the relay and deterministic energy loss in transmitting energy. In other words, to be able to send an energy-contained symbol, the relay must receive multiple energy-contained symbols. Thus, we face a kind of channel with memor… ▽ More

    Submitted 13 April, 2017; originally announced April 2017.

  38. arXiv:1702.03590  [pdf, other

    cs.IT

    On the Capacity of a Class of Signal-Dependent Noise Channels

    Authors: Hamid Ghourchian, Gholamali Aminian, Amin Gohari, Mahtab Mirmohseni, Masoumeh Nasiri-Kenari

    Abstract: In some applications, the variance of additive measurement noise depends on the signal that we aim to measure. For instance, additive Gaussian signal-dependent noise (AGSDN) channel models are used in molecular and optical communication. Herein we provide lower and upper bounds on the capacity of additive signal-dependent noise (ASDN) channels. The idea of the first lower bound is the extension of… ▽ More

    Submitted 2 June, 2017; v1 submitted 12 February, 2017; originally announced February 2017.

    Comments: 34 pages, 3 figures

  39. arXiv:1701.05392  [pdf, other

    cs.IT

    On Optimal Online Algorithms for Energy Harvesting Systems with Continuous Energy and Data Arrivals

    Authors: Milad Rezaee, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: Energy harvesting (EH) has been developed to extend the lifetimes of energy-limited communication systems. In this letter, we consider a single-user EH communication system, in which both of the arrival data and the harvested energy curves are modeled as general functions. Unlike most of the works in the field, we investigate the online algorithms which only acquire the causal information of the a… ▽ More

    Submitted 19 January, 2017; originally announced January 2017.

    Comments: This paper has been submitted to IEEE Wireless Communications Letters

  40. arXiv:1612.09496  [pdf, other

    cs.IT

    Optimal Transmission Policies for Multi-hop Energy Harvesting Systems

    Authors: Milad Rezaee, Mahtab Mirmohseni, Vaneet Aggarwal, Mohammad Reza Aref

    Abstract: In this paper, we consider a multi-hop energy harvesting (EH) communication system in a full-duplex mode, where arrival data and harvested energy curves in the source and the relays are modeled as general functions. This model includes the EH system with discrete arrival processes as a special case. We investigate the throughput maximization problem considering minimum utilized energy in the sourc… ▽ More

    Submitted 30 December, 2016; originally announced December 2016.

    Comments: paper has been submitted to IEEE Transactions on Wireless Communications

  41. arXiv:1612.03360  [pdf, other

    cs.IT

    Information Theory of Molecular Communication: Directions and Challenges

    Authors: Amin Gohari, Mahtab Mirmohseni, Masoumeh Nasiri-Kenari

    Abstract: Molecular Communication (MC) is a communication strategy that uses molecules as carriers of information, and is widely used by biological cells. As an interdisciplinary topic, it has been studied by biologists, communication theorists and a growing number of information theorists. This paper aims to specifically bring MC to the attention of information theorists. To do this, we first highlight the… ▽ More

    Submitted 10 December, 2016; originally announced December 2016.

    Comments: Accepted for publication in the IEEE Transactions on Molecular, Biological, and Multi-Scale Communications as a Shannon Centennial Special Issue

  42. arXiv:1605.05693  [pdf, ps, other

    cs.IT

    Capacity of the State-Dependent Wiretap Channel: Secure Writing on Dirty Paper

    Authors: Hamid G. Bafghi, Babak Seyfe, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: In this paper we consider the State-Dependent Wiretap Channel (SD-WC). As the main idea, we model the SD-WC as a Cognitive Interference Channel (CIC), in which the primary receiver acts as an eavesdropper for the cognitive transmitter's message. By this point of view, the Channel State Information (CSI) in SD-WC plays the role of the primary user's message in CIC which can be decoded at the eavesd… ▽ More

    Submitted 18 May, 2016; originally announced May 2016.

    Comments: Submitted to: IEEE Transaction on Forensics and Security

  43. arXiv:1604.05680  [pdf, ps, other

    cs.IT

    On Medium Chemical Reaction in Diffusion-Based Molecular Communication: a Two-Way Relaying Example

    Authors: Maryam Farahnak-Ghazani, Gholamali Aminian, Mahtab Mirmohseni, Amin Gohari, Masoumeh Nasiri-Kenari

    Abstract: Chemical reactions are a prominent feature of molecular communication (MC) systems, with no direct parallels in wireless communications. While chemical reactions may be used inside the transmitter nodes, receiver nodes or the communication medium, we focus on its utility in the medium in this paper. Such chemical reactions can be used to perform computation over the medium as molecules diffuse and… ▽ More

    Submitted 24 April, 2018; v1 submitted 19 April, 2016; originally announced April 2016.

    Comments: 32 pages, 6 figures

  44. arXiv:1604.04818  [pdf, ps, other

    cs.IT cs.CR

    Secrecy Capacity in Large Cooperative Networks in Presence of Eavesdroppers with Unknown Locations

    Authors: Amir Hossein Hadavi, Narges Kazempour, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: In this paper, an extended large wireless network under the secrecy constraint is considered. In contrast to works which use idealized assumptions, a more realistic network situation with unknown eavesdroppers locations is investigated: the legitimate users only know their own Channel State Information (CSI), not the eavesdroppers CSI. Also, the network is analyzed by taking in to account the effe… ▽ More

    Submitted 16 April, 2016; originally announced April 2016.

  45. arXiv:1603.01819  [pdf, other

    cs.IT cs.ET

    Type Based Sign Modulation and its Application for ISI mitigation in Molecular Communication

    Authors: Reza Mosayebi, Amin Gohari, Mahtab Mirmohseni, Masoumeh Nasiri Kenari

    Abstract: An important challenge in design of modulation schemes for molecular communication is positivity of the transmission signal (only a positive concentration of molecules can be released in the environment). This restriction makes handling of the InterSymbol Interference (ISI) a challenge for molecular communication. Previous works have proposed use of chemical reactions to remove molecules from the… ▽ More

    Submitted 14 December, 2016; v1 submitted 6 March, 2016; originally announced March 2016.

  46. arXiv:1601.04622  [pdf

    cs.CR

    Investigating the Performances and Vulnerabilities of Two New Protocols Based on R-RAPSE

    Authors: Seyed Salman Sajjadi Ghaemmaghami, Afrooz Haghbin, Mahtab Mirmohseni

    Abstract: Radio Frequency IDentification (RFID) is a pioneer technology which has depicted a new lifestyle for humanity in all around the world. Every day we observe an increase in the scope of RFID applications and no one cannot withdraw its numerous usage around him/herself. An important issue which should be considered is providing privacy and security requirements of an RFID system. Recently in 2014, Ca… ▽ More

    Submitted 18 January, 2016; originally announced January 2016.

    Comments: 5 figures, 2 tables

  47. arXiv:1511.07168  [pdf, ps, other

    cs.IT

    On The Secrecy of the Cognitive Interference Channel with Partial Channel States

    Authors: Hamid G. Bafghi, Babak Seyfe, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: The secrecy problem in the state-dependent cognitive interference channel is considered in this paper. In our model, there are a primary and a secondary (cognitive) transmitter-receiver pairs, in which the cognitive transmitter has the message of the primary one as side information. In addition, the channel is affected by a channel state sequence which is estimated partially at the cognitive trans… ▽ More

    Submitted 18 May, 2016; v1 submitted 23 November, 2015; originally announced November 2015.

    Comments: 14 pages, 3 figures, submitted to TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (ETT)

  48. arXiv:1510.04197  [pdf

    cs.CR

    A Privacy Preserving Improvement for SRTA in Telecare Systems

    Authors: Seyed Salman Sajjadi Ghaemmaghami, Mahtab Mirmohseni, Afrooz Haghbin

    Abstract: Radio Frequency Identification (RFID) is a modern communication technology, which provides authentication and identification through a nonphysical contact. Recently, the use of this technology is almost developed in healthcare environments. Although RFID technology can prepare sagacity in systems, privacy and security issues ought to be considered before. Recently, in 2015, Li et al. proposed SRTA… ▽ More

    Submitted 14 October, 2015; originally announced October 2015.

  49. arXiv:1509.05877  [pdf, other

    cs.IT q-bio.MN

    On the Capacity of Point-to-Point and Multiple-Access Molecular Communications with Ligand-Receptors

    Authors: Gholamali Aminian, Maryam Farahnak Ghazani, Mahtab Mirmohseni, Masoumeh Nasiri Kenari, Faramarz Fekri

    Abstract: In this paper, we consider the bacterial point-to-point and multiple-access molecular communications with ligand-receptors. For the point-to-point communication, we investigate common signaling methods, namely the Level Scenario (LS), which uses one type of a molecule with different concentration levels, and the Type Scenario (TS), which employs multiple types of molecules with a single concentrat… ▽ More

    Submitted 19 September, 2015; originally announced September 2015.

  50. arXiv:1508.02495  [pdf, other

    cs.IT

    On ISI-free Modulations for Diffusion based Molecular Communication

    Authors: Hamidreza Arjmandi, Mohammad Movahednasab, Amin Gohari, Mahtab Mirmohseni, Masoumeh Nasiri Kenari, Faramarz Fekri

    Abstract: A diffusion molecular channel is a channel with memory, as molecules released into the medium hit the receptors after a random delay. Coding over the diffusion channel is performed by choosing the type, intensity, or the released time of molecules diffused in the environment over time. To avoid intersymbol interference (ISI), molecules of the same type should be released at time instances that are… ▽ More

    Submitted 11 August, 2015; originally announced August 2015.