Skip to main content

Showing 1–11 of 11 results for author: Behroozi, H

Searching in archive eess. Search in all archives.
.
  1. arXiv:2505.04148  [pdf, other

    eess.SP eess.SY

    Energy Efficient RSMA-Based LEO Satellite Communications Assisted by UAV-Mounted BD-Active RIS: A DRL Approach

    Authors: Rahman Saadat Yeganeh, Hamid Behroozi

    Abstract: This paper proposes an advanced non-terrestrial communication architecture that integrates Rate-Splitting Multiple Access (RSMA) with a Beyond-Diagonal Active Reconfigurable Intelligent Surface (BD-ARIS) mounted on a UAV under the coverage of a Low Earth Orbit (LEO) satellite. The BD-ARIS adopts a group-connected structure to enhance signal amplification and adaptability, while RSMA enables effici… ▽ More

    Submitted 7 May, 2025; originally announced May 2025.

  2. arXiv:2412.17110  [pdf, other

    cs.IT eess.SP

    Deep Joint Source Channel Coding for Privacy-Aware End-to-End Image Transmission

    Authors: Mehdi Letafati, Seyyed Amirhossein Ameli Kalkhoran, Ecenaz Erdemir, Babak Hossein Khalaj, Hamid Behroozi, Deniz Gündüz

    Abstract: Deep neural network (DNN)-based joint source and channel coding is proposed for privacy-aware end-to-end image transmission against multiple eavesdroppers. Both scenarios of colluding and non-colluding eavesdroppers are considered. Unlike prior works that assume perfectly known and independent identically distributed (i.i.d.) source and channel statistics, the proposed scheme operates under unknow… ▽ More

    Submitted 4 April, 2025; v1 submitted 22 December, 2024; originally announced December 2024.

  3. arXiv:2308.02892  [pdf, ps, other

    cs.IT cs.LG eess.IV

    Secure Deep-JSCC Against Multiple Eavesdroppers

    Authors: Seyyed Amirhossein Ameli Kalkhoran, Mehdi Letafati, Ecenaz Erdemir, Babak Hossein Khalaj, Hamid Behroozi, Deniz Gündüz

    Abstract: In this paper, a generalization of deep learning-aided joint source channel coding (Deep-JSCC) approach to secure communications is studied. We propose an end-to-end (E2E) learning-based approach for secure communication against multiple eavesdroppers over complex-valued fading channels. Both scenarios of colluding and non-colluding eavesdroppers are studied. For the colluding strategy, eavesdropp… ▽ More

    Submitted 5 August, 2023; originally announced August 2023.

  4. arXiv:2212.01563  [pdf, other

    eess.SP

    Intelligent Reflecting Surface Assisted Secret Key Generation Under Spatially Correlated Channels in Quasi-Static Environments

    Authors: Vahid Shahiri, Hamid Behroozi, Ali Kuhestani

    Abstract: Physical layer key generation (PLKG) can significantly enhance the security of classic encryption schemes by enabling them to change their secret keys significantly faster and more efficient. However, due to the reliance of PLKG techniques on channel medium, reaching a high secret key rate is challenging in static environments. Recently, exploiting intelligent reflecting surface (IRS) as a means t… ▽ More

    Submitted 3 December, 2022; originally announced December 2022.

  5. Secure SWIPT in the Multiuser STAR-RIS Aided MISO Rate Splitting Downlink

    Authors: Hamid Reza Hashempour, Hamed Bastami, Majid Moradikia, Seyed A. Zekavat, Hamid Behroozi, Gilberto Berardinelli, A. Lee Swindlehurst

    Abstract: Recently, simultaneously transmitting and reflecting reconfigurable intelligent surfaces (STAR-RISs) have emerged as a novel technology that provides 360 coverage and new degrees-of-freedom (DoFs). They are also capable of manipulating signal propagation and simultaneous wireless information and power transfer (SWIPT). This paper introduces a novel STAR-RIS-aided secure SWIPT system for downlink m… ▽ More

    Submitted 2 June, 2024; v1 submitted 16 November, 2022; originally announced November 2022.

    Comments: 16 pages, journal paper

  6. arXiv:2210.03926  [pdf, ps, other

    cs.IT eess.SP

    Secrecy Rate of the Cooperative RSMA-Aided UAV Downlink Relying on Optimal Relay Selection

    Authors: Hamed Bastami, Majid Moradikia, Hamid Behroozi, Lajos Hanzo

    Abstract: The Cooperative Rate-Splitting (CRS) scheme, proposed evolves from conventional Rate Splitting (RS) and relies on forwarding a portion of the RS message by the relaying users. In terms of secrecy enhancement, it has been shown that CRS outperforms its non-cooperative counterpart for a two-user Multiple Input Single Output (MISO) Broadcast Channel (BC). Given the massive connectivity requirement of… ▽ More

    Submitted 8 October, 2022; originally announced October 2022.

    Comments: arXiv admin note: text overlap with arXiv:1910.07843 by other authors

  7. arXiv:2209.12591  [pdf, ps, other

    cs.IT eess.SP

    Large-Scale Rate-Splitting Multiple Access in Uplink UAV Networks: Effective Secrecy Throughput Maximization Under Limited Feedback Channel

    Authors: Hamed Bastami, Hamid Behroozi, Majid Moradikia, Ahmed Abdelhadi, Derrick Wing Kwan Ngand, Lajos Hanzo

    Abstract: UAVs are capable of improving the performance of next generation wireless systems. Specifically, UAVs can be exploited as aerial base-stations (UAV-BS) for supporting legitimate ground users in remote uncovered areas or in environments temporarily requiring high capacity. However, their communication performance is prone to both channel estimation errors and potential eavesdropping. Hence, we inve… ▽ More

    Submitted 26 September, 2022; originally announced September 2022.

  8. arXiv:2101.02749  [pdf, other

    eess.SP

    Secrecy Rate Maximization for Hardware Impaired Untrusted Relaying Network with Deep Learning

    Authors: Hamed Bastami, Majid Moradikia, Hamid Behroozi, Rodrigo C. de Lamare, Ahmed Abdelhadi, Zhigou Ding

    Abstract: This paper investigates the physical layer security design of an untrusted relaying network where the source node coexists with a multi-antenna eavesdropper (Eve). While the communication relies on untrustworthy relay nodes to increase reliability, we aim to protect the confidentiality of information against combined eavesdropping attacks performed by both untrusted relay nodes and Eve. Taking int… ▽ More

    Submitted 7 January, 2021; originally announced January 2021.

    Comments: 31 pages, 17 figures

  9. arXiv:2006.09860  [pdf, ps, other

    eess.SP

    Compressed-Domain Detection and Estimation for Colocated MIMO Radar

    Authors: Ehsan Tohidi, Alireza Hariri, Hamid Behroozi, Mohammad Mahdi Nayebi, Geert Leus, Athina Petropulu

    Abstract: This paper proposes compressed domain signal processing (CSP) multiple input multiple output (MIMO) radar, a MIMO radar approach that achieves substantial sample complexity reduction by exploiting the idea of CSP. CSP MIMO radar involves two levels of data compression followed by target detection at the compressed domain. First, compressive sensing is applied at the receive antennas, followed by a… ▽ More

    Submitted 17 June, 2020; originally announced June 2020.

  10. Can a Multi-Hop Link Relying on Untrusted Amplify-and-Forward Relays Render Security?

    Authors: Milad Tatar Mamaghani, Ali Kuhestani, Hamid Behroozi

    Abstract: Cooperative relaying is utilized as an efficient method for data communication in wireless sensor networks and the Internet of Things (IoT). However, sometimes due to the necessity of multi-hop relaying in such communication networks, it is challenging to guarantee the secrecy of cooperative transmissions when the relays may themselves be eavesdroppers, i.e., we may face with the untrusted relayin… ▽ More

    Submitted 5 July, 2020; v1 submitted 17 May, 2019; originally announced May 2019.

    Comments: 24 pages, 9 figures, submitted for journal publication

  11. Sparse Antenna and Pulse Placement for Colocated MIMO Radar

    Authors: Ehsan Tohidi, Mario Coutino, Sundeep Prabhakar Chepuri, Hamid Behroozi, Mohammad Mahdi Nayebi, Geert Leus

    Abstract: Multiple input multiple output (MIMO) radar is known for its superiority over conventional radar due to its antenna and waveform diversity. Although higher angular resolution, improved parameter identifiability, and better target detection are achieved, the hardware costs (due to multiple transmitters and multiple receivers) and high energy consumption (multiple pulses) limit the usage of MIMO rad… ▽ More

    Submitted 27 May, 2018; originally announced May 2018.