Skip to main content

Showing 1–12 of 12 results for author: Sheikholeslami, A

.
  1. arXiv:2412.13352  [pdf, other

    cs.CR

    Key Exchange in the Quantum Era: Evaluating a Hybrid System of Public-Key Cryptography and Physical-Layer Security

    Authors: Paul Staat, Meik Dörpinghaus, Azadeh Sheikholeslami, Christof Paar, Gerhard Fettweis, Dennis Goeckel

    Abstract: Today's information society relies on cryptography to achieve security goals such as confidentiality, integrity, authentication, and non-repudiation for digital communications. Here, public-key cryptosystems play a pivotal role to share encryption keys and create digital signatures. However, quantum computers threaten the security of traditional public-key cryptosystems as they can tame computatio… ▽ More

    Submitted 17 December, 2024; originally announced December 2024.

  2. arXiv:2210.10513  [pdf, other

    stat.CO

    Sampling via Rejection-Free Partial Neighbor Search

    Authors: Sigeng Chen, Jeffrey S. Rosenthal, Aki Dote, Hirotaka Tamura, Ali Sheikholeslami

    Abstract: The Metropolis algorithm involves producing a Markov chain to converge to a specified target density $π$. In order to improve its efficiency, we can use the Rejection-Free version of the Metropolis algorithm, which avoids the inefficiency of rejections by evaluating all neighbors. Rejection-Free can be made more efficient through the use of parallelism hardware. However, for some specialized hardw… ▽ More

    Submitted 19 October, 2022; originally announced October 2022.

    Comments: 34 pages and 11 figures

  3. arXiv:2205.02083  [pdf, other

    math.OC stat.ME

    Optimization via Rejection-Free Partial Neighbor Search

    Authors: Sigeng Chen, Jeffrey S. Rosenthal, Aki Dote, Hirotaka Tamura, Ali Sheikholeslami

    Abstract: Simulated Annealing using Metropolis steps at decreasing temperatures is widely used to solve complex combinatorial optimization problems. In order to improve its efficiency, we can use the Rejection-Free version of the Metropolis algorithm, which avoids the inefficiency of rejections by considering all the neighbors at every step. As a solution to avoid the algorithm from becoming stuck in local… ▽ More

    Submitted 7 October, 2022; v1 submitted 15 April, 2022; originally announced May 2022.

    Comments: 24 pages with 2 more pages of reference, 9 figures

  4. arXiv:2203.02471  [pdf, other

    cs.LG cs.DM math.OC stat.CO stat.ML

    Graph clustering with Boltzmann machines

    Authors: Pierre Miasnikof, Mohammad Bagherbeik, Ali Sheikholeslami

    Abstract: Graph clustering is the process of grouping vertices into densely connected sets called clusters. We tailor two mathematical programming formulations from the literature, to this problem. In doing so, we obtain a heuristic approximation to the intra-cluster density maximization problem. We use two variations of a Boltzmann machine heuristic to obtain numerical solutions. For benchmarking purposes,… ▽ More

    Submitted 26 September, 2022; v1 submitted 4 March, 2022; originally announced March 2022.

    Journal ref: Discrete Applied Mathematics, Volume 343, 2024

  5. arXiv:2001.11114  [pdf, other

    cs.LG cs.DM math.FA stat.ML

    A Family of Pairwise Multi-Marginal Optimal Transports that Define a Generalized Metric

    Authors: Liang Mi, Azadeh Sheikholeslami, José Bento

    Abstract: The Optimal transport (OT) problem is rapidly finding its way into machine learning. Favoring its use are its metric properties. Many problems admit solutions with guarantees only for objects embedded in metric spaces, and the use of non-metrics can complicate solving them. Multi-marginal OT (MMOT) generalizes OT to simultaneously transporting multiple distributions. It captures important relation… ▽ More

    Submitted 22 December, 2022; v1 submitted 29 January, 2020; originally announced January 2020.

    Comments: Machine Learning (2022)

  6. Jump Markov Chains and Rejection-Free Metropolis Algorithms

    Authors: J. S. Rosenthal, A. Dote, K. Dabiri, H. Tamura, S. Chen, A. Sheikholeslami

    Abstract: We consider versions of the Metropolis algorithm which avoid the inefficiency of rejections. We first illustrate that a natural Uniform Selection Algorithm might not converge to the correct distribution. We then analyse the use of Markov jump chains which avoid successive repetitions of the same state. After exploring the properties of jump chains, we show how they can exploit parallelism in compu… ▽ More

    Submitted 28 October, 2020; v1 submitted 29 October, 2019; originally announced October 2019.

    Comments: 25 pages, 10 figures, 3 tables

  7. arXiv:1803.04100  [pdf, ps, other

    cs.NI

    Multi-Hop Routing in Covert Wireless Networks

    Authors: Azadeh Sheikholeslami, Majid Ghaderi, Don Towsley, Boulat A. Bash, Saikat Guha, Dennis Goeckel

    Abstract: In covert communication, Alice tries to communicate with Bob without being detected by a warden Willie. When the distance between Alice and Bob becomes large compared to the distance between Alice and Willie(s), the performance of covert communication will be degraded. In this case, multi-hop message transmission via intermediate relays can help to improve performance. Hence, in this work multi-ho… ▽ More

    Submitted 11 March, 2018; originally announced March 2018.

    Comments: Accepted in IEEE Transactions of Wireless Communications

  8. Energy-Efficient Secrecy in Wireless Networks Based on Random Jamming

    Authors: Azadeh Sheikholeslami, Majid Ghaderi, Hossein Pishro-Nik, Dennis Goeckel

    Abstract: This paper considers secure energy-efficient routing in the presence of multiple passive eavesdroppers. Previous work in this area has considered secure routing assuming probabilistic or exact knowledge of the location and channel-state-information (CSI) of each eavesdropper. In wireless networks, however, the locations and CSIs of passive eavesdroppers are not known, making it challenging to guar… ▽ More

    Submitted 15 March, 2017; originally announced March 2017.

  9. arXiv:1601.06826  [pdf, other

    quant-ph cs.IT

    Fundamental Limits of Covert Communication over Classical-Quantum Channels

    Authors: Michael S. Bullock, Azadeh Sheikholeslami, Mehrdad Tahmasbi, Robert C. Macdonald, Saikat Guha, Boulat A. Bash

    Abstract: We investigate covert communication over general memoryless classical-quantum channels with fixed finite-size input alphabets. We show that the square root law (SRL) governs covert communication in this setting when product of $n$ input states is used: $L_{\rm SRL}\sqrt{n}+o(\sqrt{n})$ covert bits (but no more) can be reliably transmitted in $n$ uses of classical-quantum channel, where… ▽ More

    Submitted 13 January, 2025; v1 submitted 25 January, 2016; originally announced January 2016.

    Comments: Corrected typos, 50 pages, 2 figures, accepted by IEEE Transactions on Information Theory

  10. Jamming Based on an Ephemeral Key to Obtain Everlasting Security in Wireless Environments

    Authors: Azadeh Sheikholeslami, Dennis Goeckel, Hossein Pishro-Nik

    Abstract: Secure communication over a wiretap channel is considered in the disadvantaged wireless environment, where the eavesdropper channel is (possibly much) better than the main channel. We present a method to exploit inherent vulnerabilities of the eavesdropper's receiver to obtain everlasting secrecy. Based on an ephemeral cryptographic key pre-shared between the transmitter Alice and the intended rec… ▽ More

    Submitted 13 November, 2014; originally announced December 2014.

    Journal ref: IEEE Transactions on Wireless Communications, Volume: 14, Issue: 11, Pages: 6072 - 6081, 2015

  11. Energy-Efficient Routing in Wireless Networks in the Presence of Jamming

    Authors: Azadeh Sheikholeslami, Majid Ghaderi, Hossein Pishro-Nik, Dennis Goeckel

    Abstract: The effectiveness and simple implementation of physical layer jammers make them an essential threat for wireless networks. In a multihop wireless network, where jammers can interfere with the transmission of user messages at intermediate nodes along the path, one can employ jamming oblivious routing and then employ physical-layer techniques (e.g. spread spectrum) to suppress jamming. However, wher… ▽ More

    Submitted 13 September, 2016; v1 submitted 13 November, 2014; originally announced November 2014.

    Journal ref: IEEE Transactions on Wireless Communications, 2016

  12. arXiv:1210.1790  [pdf, ps, other

    cs.CR cs.IT

    Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper's Receiver

    Authors: Azadeh Sheikholeslami, Dennis Goeckel, Hossein Pishro-Nik

    Abstract: Secure communication over a memoryless wiretap channel in the presence of a passive eavesdropper is considered. Traditional information-theoretic security methods require an advantage for the main channel over the eavesdropper channel to achieve a positive secrecy rate, which in general cannot be guaranteed in wireless systems. Here, we exploit the non-linear conversion operation in the eavesdropp… ▽ More

    Submitted 15 November, 2013; v1 submitted 5 October, 2012; originally announced October 2012.