Skip to main content

Showing 1–17 of 17 results for author: Behroozi, H

.
  1. arXiv:2308.02892  [pdf, ps, other

    cs.IT cs.LG eess.IV

    Secure Deep-JSCC Against Multiple Eavesdroppers

    Authors: Seyyed Amirhossein Ameli Kalkhoran, Mehdi Letafati, Ecenaz Erdemir, Babak Hossein Khalaj, Hamid Behroozi, Deniz Gündüz

    Abstract: In this paper, a generalization of deep learning-aided joint source channel coding (Deep-JSCC) approach to secure communications is studied. We propose an end-to-end (E2E) learning-based approach for secure communication against multiple eavesdroppers over complex-valued fading channels. Both scenarios of colluding and non-colluding eavesdroppers are studied. For the colluding strategy, eavesdropp… ▽ More

    Submitted 5 August, 2023; originally announced August 2023.

  2. arXiv:2212.01563  [pdf, other

    eess.SP

    Intelligent Reflecting Surface Assisted Secret Key Generation Under Spatially Correlated Channels in Quasi-Static Environments

    Authors: Vahid Shahiri, Hamid Behroozi, Ali Kuhestani

    Abstract: Physical layer key generation (PLKG) can significantly enhance the security of classic encryption schemes by enabling them to change their secret keys significantly faster and more efficient. However, due to the reliance of PLKG techniques on channel medium, reaching a high secret key rate is challenging in static environments. Recently, exploiting intelligent reflecting surface (IRS) as a means t… ▽ More

    Submitted 3 December, 2022; originally announced December 2022.

  3. Secure SWIPT in the Multiuser STAR-RIS Aided MISO Rate Splitting Downlink

    Authors: Hamid Reza Hashempour, Hamed Bastami, Majid Moradikia, Seyed A. Zekavat, Hamid Behroozi, Gilberto Berardinelli, A. Lee Swindlehurst

    Abstract: Recently, simultaneously transmitting and reflecting reconfigurable intelligent surfaces (STAR-RISs) have emerged as a novel technology that provides 360 coverage and new degrees-of-freedom (DoFs). They are also capable of manipulating signal propagation and simultaneous wireless information and power transfer (SWIPT). This paper introduces a novel STAR-RIS-aided secure SWIPT system for downlink m… ▽ More

    Submitted 2 June, 2024; v1 submitted 16 November, 2022; originally announced November 2022.

    Comments: 16 pages, journal paper

  4. arXiv:2210.03926  [pdf, ps, other

    cs.IT eess.SP

    Secrecy Rate of the Cooperative RSMA-Aided UAV Downlink Relying on Optimal Relay Selection

    Authors: Hamed Bastami, Majid Moradikia, Hamid Behroozi, Lajos Hanzo

    Abstract: The Cooperative Rate-Splitting (CRS) scheme, proposed evolves from conventional Rate Splitting (RS) and relies on forwarding a portion of the RS message by the relaying users. In terms of secrecy enhancement, it has been shown that CRS outperforms its non-cooperative counterpart for a two-user Multiple Input Single Output (MISO) Broadcast Channel (BC). Given the massive connectivity requirement of… ▽ More

    Submitted 8 October, 2022; originally announced October 2022.

    Comments: arXiv admin note: text overlap with arXiv:1910.07843 by other authors

  5. arXiv:2209.12591  [pdf, ps, other

    cs.IT eess.SP

    Large-Scale Rate-Splitting Multiple Access in Uplink UAV Networks: Effective Secrecy Throughput Maximization Under Limited Feedback Channel

    Authors: Hamed Bastami, Hamid Behroozi, Majid Moradikia, Ahmed Abdelhadi, Derrick Wing Kwan Ngand, Lajos Hanzo

    Abstract: UAVs are capable of improving the performance of next generation wireless systems. Specifically, UAVs can be exploited as aerial base-stations (UAV-BS) for supporting legitimate ground users in remote uncovered areas or in environments temporarily requiring high capacity. However, their communication performance is prone to both channel estimation errors and potential eavesdrop**. Hence, we inve… ▽ More

    Submitted 26 September, 2022; originally announced September 2022.

  6. arXiv:2108.03375  [pdf, other

    cs.CV cs.MM

    Temporal Action Localization Using Gated Recurrent Units

    Authors: Hassan Keshvarikhojasteh, Hoda Mohammadzade, Hamid Behroozi

    Abstract: Temporal Action Localization (TAL) task which is to predict the start and end of each action in a video along with the class label of the action has numerous applications in the real world. But due to the complexity of this task, acceptable accuracy rates have not been achieved yet, whereas this is not the case regarding the action recognition task. In this paper, we propose a new network based on… ▽ More

    Submitted 24 May, 2022; v1 submitted 7 August, 2021; originally announced August 2021.

    Comments: 10 pages, 6 figures

  7. arXiv:2104.09326  [pdf, ps, other

    cs.IT

    On Learning-Assisted Content-Based Secure Image Transmission for Delay-Aware Systems with Randomly-Distributed Eavesdroppers -- Extended Version

    Authors: Mehdi Letafati, Hamid Behroozi, Babak Hossein Khalaj, Eduard A. Jorswieck

    Abstract: In this paper, a learning-aided content-based wireless image transmission scheme is proposed, where a multi-antenna-aided source wishes to securely deliver an image to a legitimate destination in the presence of randomly distributed eavesdroppers (Eves). We take into account the fact that not all regions of an image have the same importance from the security perspective. Hence, we propose a transm… ▽ More

    Submitted 19 April, 2021; originally announced April 2021.

  8. arXiv:2103.01119  [pdf, ps, other

    cs.LG

    DTW-Merge: A Novel Data Augmentation Technique for Time Series Classification

    Authors: Mohammad Akyash, Hoda Mohammadzade, Hamid Behroozi

    Abstract: In recent years, neural networks achieved much success in various applications. The main challenge in training deep neural networks is the lack of sufficient data to improve the model's generalization and avoid overfitting. One of the solutions is to generate new training samples. This paper proposes a novel data augmentation method for time series based on Dynamic Time War**. This method is ins… ▽ More

    Submitted 21 August, 2021; v1 submitted 1 March, 2021; originally announced March 2021.

  9. arXiv:2101.02749  [pdf, other

    eess.SP

    Secrecy Rate Maximization for Hardware Impaired Untrusted Relaying Network with Deep Learning

    Authors: Hamed Bastami, Majid Moradikia, Hamid Behroozi, Rodrigo C. de Lamare, Ahmed Abdelhadi, Zhigou Ding

    Abstract: This paper investigates the physical layer security design of an untrusted relaying network where the source node coexists with a multi-antenna eavesdropper (Eve). While the communication relies on untrustworthy relay nodes to increase reliability, we aim to protect the confidentiality of information against combined eavesdrop** attacks performed by both untrusted relay nodes and Eve. Taking int… ▽ More

    Submitted 7 January, 2021; originally announced January 2021.

    Comments: 31 pages, 17 figures

  10. arXiv:2011.04801  [pdf, ps, other

    cs.IT cs.GT

    Fairness-Oriented User Association in HetNets Using Bargaining Game Theory

    Authors: Ehsan Sadeghi, Hamid Behroozi, Stefano Rini

    Abstract: In this paper, the user association and resource allocation problem is investigated for a two-tier HetNet consisting of one macro Base Station (BS) and a number of pico BSs. The effectiveness of user association to BSs is evaluated in terms of fairness and load distribution. In particular, the problem of determining a fair user association is formulated as a bargaining game so that for the Nash Ba… ▽ More

    Submitted 9 November, 2020; originally announced November 2020.

  11. arXiv:2006.09860  [pdf, ps, other

    eess.SP

    Compressed-Domain Detection and Estimation for Colocated MIMO Radar

    Authors: Ehsan Tohidi, Alireza Hariri, Hamid Behroozi, Mohammad Mahdi Nayebi, Geert Leus, Athina Petropulu

    Abstract: This paper proposes compressed domain signal processing (CSP) multiple input multiple output (MIMO) radar, a MIMO radar approach that achieves substantial sample complexity reduction by exploiting the idea of CSP. CSP MIMO radar involves two levels of data compression followed by target detection at the compressed domain. First, compressive sensing is applied at the receive antennas, followed by a… ▽ More

    Submitted 17 June, 2020; originally announced June 2020.

  12. Can a Multi-Hop Link Relying on Untrusted Amplify-and-Forward Relays Render Security?

    Authors: Milad Tatar Mamaghani, Ali Kuhestani, Hamid Behroozi

    Abstract: Cooperative relaying is utilized as an efficient method for data communication in wireless sensor networks and the Internet of Things (IoT). However, sometimes due to the necessity of multi-hop relaying in such communication networks, it is challenging to guarantee the secrecy of cooperative transmissions when the relays may themselves be eavesdroppers, i.e., we may face with the untrusted relayin… ▽ More

    Submitted 5 July, 2020; v1 submitted 17 May, 2019; originally announced May 2019.

    Comments: 24 pages, 9 figures, submitted for journal publication

  13. Sparse Antenna and Pulse Placement for Colocated MIMO Radar

    Authors: Ehsan Tohidi, Mario Coutino, Sundeep Prabhakar Chepuri, Hamid Behroozi, Mohammad Mahdi Nayebi, Geert Leus

    Abstract: Multiple input multiple output (MIMO) radar is known for its superiority over conventional radar due to its antenna and waveform diversity. Although higher angular resolution, improved parameter identifiability, and better target detection are achieved, the hardware costs (due to multiple transmitters and multiple receivers) and high energy consumption (multiple pulses) limit the usage of MIMO rad… ▽ More

    Submitted 27 May, 2018; originally announced May 2018.

  14. arXiv:1408.4100  [pdf, ps, other

    cs.IT

    On the Ice-Wine Problem: Recovering Linear Combination of Codewords over the Gaussian Multiple Access Channel

    Authors: Shahab Ghasemi-Goojani, Hamid Behroozi

    Abstract: In this paper, we consider the Ice-Wine problem: Two transmitters send their messages over the Gaussian Multiple-Access Channel (MAC) and a receiver aims to recover a linear combination of codewords. The best known achievable rate-region for this problem is due to [1],[2] as $R_{i}\leq\frac{1}{2}\log\left(\frac{1}{2}+{\rm SNR}\right)$ $(i=1,2)$. In this paper, we design a novel scheme using lattic… ▽ More

    Submitted 18 August, 2014; originally announced August 2014.

    Comments: To appear in IEEE Information Theory Workshop 2014(ITW 2014), Hobart, Australia

  15. arXiv:1301.6291  [pdf, ps, other

    cs.IT

    Nested Lattice Codes for Gaussian Two-Way Relay Channels

    Authors: Shahab Ghasemi-Goojani, Hamid Behroozi

    Abstract: In this paper, we consider a Gaussian two-way relay channel (GTRC), where two sources exchange messages with each other through a relay. We assume that there is no direct link between sources, and all nodes operate in full-duplex mode. By utilizing nested lattice codes for the uplink (i.e., MAC phase), and structured binning for the downlink (i.e., broadcast phase), we propose two achievable schem… ▽ More

    Submitted 26 January, 2013; originally announced January 2013.

  16. arXiv:1301.5535  [pdf, ps, other

    cs.IT

    On the Achievable Rate-Regions for State-Dependent Gaussian Interference Channel

    Authors: Shahab Ghasemi-Goojani, Hamid Behroozi

    Abstract: In this paper, we study a general additive state-dependent Gaussian interference channel (ASD-GIC) where we consider two-user interference channel with two independent states known non-causally at both transmitters, but unknown to either of the receivers. An special case, where the additive states over the two links are the same is studied in [1], [2], in which it is shown that the gap between the… ▽ More

    Submitted 23 January, 2013; originally announced January 2013.

  17. arXiv:0807.0868  [pdf, other

    cs.IT

    On the Capacity of Pairwise Collaborative Networks

    Authors: Saeed A. Astaneh, Saeed Gazor, Hamid Behroozi

    Abstract: We derive expressions for the achievable rate region of a collaborative coding scheme in a two-transmitter, two-receiver Pairwise Collaborative Network (PCN) where one transmitter and receiver pair, namely relay pair, assists the other pair, namely the source pair, by partially decoding and forwarding the transmitted message to the intended receiver. The relay pair provides such assistance while… ▽ More

    Submitted 5 July, 2008; originally announced July 2008.

    Comments: Accepted for publication at PIMRC'08