Skip to main content

Showing 1–32 of 32 results for author: Huleihel, W

.
  1. arXiv:2407.05277  [pdf, other

    eess.SP math.ST

    Einstein from Noise: Statistical Analysis

    Authors: Amnon Balanov, Wasim Huleihel, Tamir Bendory

    Abstract: ``Einstein from noise" (EfN) is a prominent example of the model bias phenomenon: systematic errors in the statistical model that lead to erroneous but consistent estimates. In the EfN experiment, one falsely believes that a set of observations contains noisy, shifted copies of a template signal (e.g., an Einstein image), whereas in reality, it contains only pure noise observations. To estimate th… ▽ More

    Submitted 7 July, 2024; originally announced July 2024.

  2. arXiv:2401.13429  [pdf, ps, other

    cs.IT cs.LG math.ST

    Detection of Correlated Random Vectors

    Authors: Dor Elimelech, Wasim Huleihel

    Abstract: In this paper, we investigate the problem of deciding whether two standard normal random vectors $\mathsf{X}\in\mathbb{R}^{n}$ and $\mathsf{Y}\in\mathbb{R}^{n}$ are correlated or not. This is formulated as a hypothesis testing problem, where under the null hypothesis, these vectors are statistically independent, while under the alternative, $\mathsf{X}$ and a randomly and uniformly permuted versio… ▽ More

    Submitted 28 January, 2024; v1 submitted 24 January, 2024; originally announced January 2024.

    Comments: 35 pages

  3. arXiv:2311.05874  [pdf, ps, other

    cs.LG cs.IT math.ST

    Testing Dependency of Unlabeled Databases

    Authors: Vered Paslev, Wasim Huleihel

    Abstract: In this paper, we investigate the problem of deciding whether two random databases $\mathsf{X}\in\mathcal{X}^{n\times d}$ and $\mathsf{Y}\in\mathcal{Y}^{n\times d}$ are statistically dependent or not. This is formulated as a hypothesis testing problem, where under the null hypothesis, these two databases are statistically independent, while under the alternative, there exists an unknown row permut… ▽ More

    Submitted 10 November, 2023; originally announced November 2023.

    Comments: 39 pages

  4. arXiv:2310.14595  [pdf, ps, other

    cs.LG cs.SI

    Online Auditing of Information Flow

    Authors: Mor Oren-Loberman, Vered Azar, Wasim Huleihel

    Abstract: Modern social media platforms play an important role in facilitating rapid dissemination of information through their massive user networks. Fake news, misinformation, and unverifiable facts on social media platforms propagate disharmony and affect society. In this paper, we consider the problem of online auditing of information flow/propagation with the goal of classifying news items as fake or g… ▽ More

    Submitted 23 October, 2023; originally announced October 2023.

    Comments: 24 pages

  5. arXiv:2309.05109   

    eess.SP cs.AI

    Deep Learning-Aided Subspace-Based DOA Recovery for Sparse Arrays

    Authors: Yoav Amiel, Dor H. Shmuel, Nir Shlezinger, Wasim Huleihel

    Abstract: Sparse arrays enable resolving more direction of arrivals (DoAs) than antenna elements using non-uniform arrays. This is typically achieved by reconstructing the covariance of a virtual large uniform linear array (ULA), which is then processed by subspace DoA estimators. However, these method assume that the signals are non-coherent and the array is calibrated; the latter often challenging to achi… ▽ More

    Submitted 17 December, 2023; v1 submitted 10 September, 2023; originally announced September 2023.

    Comments: Project is still under work

  6. arXiv:2306.06643  [pdf, ps, other

    cs.IT math.ST

    Detection and Recovery of Hidden Submatrices

    Authors: Marom Dadon, Wasim Huleihel, Tamir Bendory

    Abstract: In this paper, we study the problems of detection and recovery of hidden submatrices with elevated means inside a large Gaussian random matrix. We consider two different structures for the planted submatrices. In the first model, the planted matrices are disjoint, and their row and column indices can be arbitrary. Inspired by scientific applications, the second model restricts the row and column i… ▽ More

    Submitted 4 July, 2023; v1 submitted 11 June, 2023; originally announced June 2023.

    Comments: 36 pages

  7. arXiv:2302.03658  [pdf, ps, other

    cs.DS cs.IT cs.LG math.ST

    Planted Bipartite Graph Detection

    Authors: Asaf Rotenberg, Wasim Huleihel, Ofer Shayevitz

    Abstract: We consider the task of detecting a hidden bipartite subgraph in a given random graph. This is formulated as a hypothesis testing problem, under the null hypothesis, the graph is a realization of an Erdős-Rényi random graph over $n$ vertices with edge density $q$. Under the alternative, there exists a planted $k_{\mathsf{R}} \times k_{\mathsf{L}}$ bipartite subgraph with edge density $p>q$. We cha… ▽ More

    Submitted 6 March, 2024; v1 submitted 7 February, 2023; originally announced February 2023.

    Comments: 37 pages

  8. arXiv:2302.03380  [pdf, ps, other

    cs.LG cs.IT math.ST

    Phase Transitions in the Detection of Correlated Databases

    Authors: Dor Elimelech, Wasim Huleihel

    Abstract: We study the problem of detecting the correlation between two Gaussian databases $\mathsf{X}\in\mathbb{R}^{n\times d}$ and $\mathsf{Y}^{n\times d}$, each composed of $n$ users with $d$ features. This problem is relevant in the analysis of social media, computational biology, etc. We formulate this as a hypothesis testing problem: under the null hypothesis, these two databases are statistically ind… ▽ More

    Submitted 4 May, 2023; v1 submitted 7 February, 2023; originally announced February 2023.

    Comments: 23 pages

  9. arXiv:2212.12921  [pdf, other

    cs.LG stat.ML

    Learning k-Level Sparse Neural Networks Using a New Generalized Weighted Group Sparse Envelope Regularization

    Authors: Yehonathan Refael, Iftach Arbel, Wasim Huleihel

    Abstract: We propose an efficient method to learn both unstructured and structured sparse neural networks during training, utilizing a novel generalization of the sparse envelope function (SEF) used as a regularizer, termed {\itshape{weighted group sparse envelope function}} (WGSEF). The WGSEF acts as a neuron group selector, which is leveraged to induce structured sparsity. The method ensures a hardware-fr… ▽ More

    Submitted 3 October, 2023; v1 submitted 25 December, 2022; originally announced December 2022.

  10. arXiv:2209.05550  [pdf, ps, other

    cs.LG cs.SI stat.CO stat.ML

    Mathematical Framework for Online Social Media Auditing

    Authors: Wasim Huleihel, Yehonathan Refael

    Abstract: Social media platforms (SMPs) leverage algorithmic filtering (AF) as a means of selecting the content that constitutes a user's feed with the aim of maximizing their rewards. Selectively choosing the contents to be shown on the user's feed may yield a certain extent of influence, either minor or major, on the user's decision-making, compared to what it would have been under a natural/fair content… ▽ More

    Submitted 20 February, 2024; v1 submitted 12 September, 2022; originally announced September 2022.

  11. arXiv:2204.07013  [pdf, other

    cs.IT

    Optimal Reference for DNA Synthesis

    Authors: Ohad Elishco, Wasim Huleihel

    Abstract: In the recent years, DNA has emerged as a potentially viable storage technology. DNA synthesis, which refers to the task of writing the data into DNA, is perhaps the most costly part of existing storage systems. Accordingly, this high cost and low throughput limits the practical use in available DNA synthesis technologies. It has been found that the homopolymer run (i.e., the repetition of the sam… ▽ More

    Submitted 14 April, 2022; originally announced April 2022.

    Comments: 21 pages

  12. arXiv:2110.01901  [pdf, ps, other

    cs.DS cs.IT cs.LG math.ST

    Inferring Hidden Structures in Random Graphs

    Authors: Wasim Huleihel

    Abstract: We study the two inference problems of detecting and recovering an isolated community of \emph{general} structure planted in a random graph. The detection problem is formalized as a hypothesis testing problem, where under the null hypothesis, the graph is a realization of an Erdős-Rényi random graph $\mathcal{G}(n,q)$ with edge density $q\in(0,1)$; under the alternative, there is an unknown struct… ▽ More

    Submitted 23 January, 2022; v1 submitted 5 October, 2021; originally announced October 2021.

    Comments: 43 pages

  13. arXiv:2110.00744  [pdf, ps, other

    cs.DS cs.IT cs.LG math.ST

    Random Subgraph Detection Using Queries

    Authors: Wasim Huleihel, Arya Mazumdar, Soumyabrata Pal

    Abstract: The planted densest subgraph detection problem refers to the task of testing whether in a given (random) graph there is a subgraph that is unusually dense. Specifically, we observe an undirected and unweighted graph on $n$ vertices. Under the null hypothesis, the graph is a realization of an Erdős-Rényi graph with edge probability (or, density) $q$. Under the alternative, there is a subgraph on… ▽ More

    Submitted 3 May, 2024; v1 submitted 2 October, 2021; originally announced October 2021.

    Comments: 27 pages

  14. arXiv:2106.02212  [pdf, other

    cs.LG cs.DS stat.ML

    Fuzzy Clustering with Similarity Queries

    Authors: Wasim Huleihel, Arya Mazumdar, Soumyabrata Pal

    Abstract: The fuzzy or soft $k$-means objective is a popular generalization of the well-known $k$-means problem, extending the clustering capability of the $k$-means to datasets that are uncertain, vague, and otherwise hard to cluster. In this paper, we propose a semi-supervised active clustering framework, where the learner is allowed to interact with an oracle (domain expert), asking for the similarity be… ▽ More

    Submitted 3 November, 2021; v1 submitted 3 June, 2021; originally announced June 2021.

    Comments: 42 pages, 7 figures (Accepted to NeurIPS 2021)

  15. arXiv:2101.12506  [pdf, other

    cs.LG cs.IR

    Learning User Preferences in Non-Stationary Environments

    Authors: Wasim Huleihel, Soumyabrata Pal, Ofer Shayevitz

    Abstract: Recommendation systems often use online collaborative filtering (CF) algorithms to identify items a given user likes over time, based on ratings that this user and a large number of other users have provided in the past. This problem has been studied extensively when users' preferences do not change over time (static case); an assumption that is often violated in practical settings. In this paper,… ▽ More

    Submitted 29 January, 2021; originally announced January 2021.

    Comments: 31 pages, 3 figures

  16. arXiv:2009.13520  [pdf, ps, other

    q-bio.SC

    Variability in mRNA Translation: A Random Matrix Theory Approach

    Authors: Michael Margaliot, Wasim Huleihel, Tamir Tuller

    Abstract: The rate of mRNA translation depends on the initiation, elongation, and termination rates of ribosomes along the mRNA. These rates depend on many "local" factors like the abundance of free ribosomes and tRNA molecules in the vicinity of the mRNA molecule. All these factors are stochastic and their experimental measurements are also noisy. An important question is how protein production in the cell… ▽ More

    Submitted 24 February, 2021; v1 submitted 28 September, 2020; originally announced September 2020.

    Comments: Accepted to Scientific Reports - Nature

  17. arXiv:2008.12823  [pdf, other

    cs.IT

    Centralized vs Decentralized Targeted Brute-Force Attacks: Guessing with Side-Information

    Authors: Salman Salamatian, Wasim Huleihel, Ahmad Beirami, Asaf Cohen, Muriel Médard

    Abstract: According to recent empirical studies, a majority of users have the same, or very similar, passwords across multiple password-secured online services. This practice can have disastrous consequences, as one password being compromised puts all the other accounts at much higher risk. Generally, an adversary may use any side-information he/she possesses about the user, be it demographic information, p… ▽ More

    Submitted 28 August, 2020; originally announced August 2020.

    Journal ref: IEEE Transactions on Information Forensics and Security, 15, 3749-3759 (2020)

  18. arXiv:2006.04117  [pdf, ps, other

    cs.LG cs.IT cs.SI math.PR stat.ML

    Sharp Thresholds of the Information Cascade Fragility Under a Mismatched Model

    Authors: Wasim Huleihel, Ofer Shayevitz

    Abstract: We analyze a sequential decision making model in which decision makers (or, players) take their decisions based on their own private information as well as the actions of previous decision makers. Such decision making processes often lead to what is known as the \emph{information cascade} or \emph{herding} phenomenon. Specifically, a cascade develops when it seems rational for some players to aban… ▽ More

    Submitted 7 June, 2020; originally announced June 2020.

    Comments: Accepted to AISTATS'20, 34 pages

  19. arXiv:1910.12490  [pdf, other

    cs.LG cs.DS cs.IT stat.ML

    Same-Cluster Querying for Overlap** Clusters

    Authors: Wasim Huleihel, Arya Mazumdar, Muriel Médard, Soumyabrata Pal

    Abstract: Overlap** clusters are common in models of many practical data-segmentation applications. Suppose we are given $n$ elements to be clustered into $k$ possibly overlap** clusters, and an oracle that can interactively answer queries of the form "do elements $u$ and $v$ belong to the same cluster?" The goal is to recover the clusters with minimum number of such queries. This problem has been of re… ▽ More

    Submitted 28 October, 2019; originally announced October 2019.

    Comments: 43 pages, accepted at NeurIPS'19

  20. arXiv:1902.06916  [pdf, ps, other

    math.ST cs.CC cs.LG math.PR

    Universality of Computational Lower Bounds for Submatrix Detection

    Authors: Matthew Brennan, Guy Bresler, Wasim Huleihel

    Abstract: In the general submatrix detection problem, the task is to detect the presence of a small $k \times k$ submatrix with entries sampled from a distribution $\mathcal{P}$ in an $n \times n$ matrix of samples from $\mathcal{Q}$. This formulation includes a number of well-studied problems, such as biclustering when $\mathcal{P}$ and $\mathcal{Q}$ are Gaussians and the planted dense subgraph formulation… ▽ More

    Submitted 1 June, 2019; v1 submitted 19 February, 2019; originally announced February 2019.

    Comments: 46 pages, accepted for presentation at Conference on Learning Theory (COLT) 2019

  21. arXiv:1806.07508  [pdf, ps, other

    cs.CC cs.DS cs.IT math.ST

    Reducibility and Computational Lower Bounds for Problems with Planted Sparse Structure

    Authors: Matthew Brennan, Guy Bresler, Wasim Huleihel

    Abstract: The prototypical high-dimensional statistics problem entails finding a structured signal in noise. Many of these problems exhibit an intriguing phenomenon: the amount of data needed by all known computationally efficient algorithms far exceeds what is needed for inefficient algorithms that search over all possible structures. A line of work initiated by Berthet and Rigollet in 2013 has aimed to ex… ▽ More

    Submitted 18 November, 2019; v1 submitted 19 June, 2018; originally announced June 2018.

    Comments: 116 pages, accepted for presentation at Conference on Learning Theory (COLT) 2018, small typos fixed in latest version

  22. arXiv:1805.11666  [pdf, other

    cs.IT cs.CR

    Why Botnets Work: Distributed Brute-Force Attacks Need No Synchronization

    Authors: Salman Salamatian, Wasim Huleihel, Ahmad Beirami, Asaf Cohen, Muriel Médard

    Abstract: In September 2017, McAffee Labs quarterly report estimated that brute force attacks represent 20\% of total network attacks, making them the most prevalent type of attack ex-aequo with browser based vulnerabilities. These attacks have sometimes catastrophic consequences, and understanding their fundamental limits may play an important role in the risk assessment of password-secured systems, and in… ▽ More

    Submitted 1 July, 2019; v1 submitted 29 May, 2018; originally announced May 2018.

    Comments: Accepted to IEEE Transactions on Information Forensics and Security

  23. arXiv:1706.05884  [pdf, ps, other

    cs.IT

    Channels with Cooperation Links that May Be Absent

    Authors: Wasim Huleihel, Yossef Steinberg

    Abstract: It is well known that cooperation between users in a communication network can lead to significant performance gains. A common assumption in past works is that all the users are aware of the resources available for cooperation, and know exactly to what extent these resources can be used. Unfortunately, in many modern communication networks the availability of cooperation links cannot be guaranteed… ▽ More

    Submitted 19 June, 2017; originally announced June 2017.

    Comments: Accepted for publication in the IEEE transaction on Information Theory, June 2017

  24. arXiv:1706.05883  [pdf, ps, other

    cs.IT

    Gaussian Intersymbol Interference Channels With Mismatch

    Authors: Wasim Huleihel, Salman Salamatian, Neri Merhav, Muriel Médard

    Abstract: This paper considers the problem of channel coding over Gaussian intersymbol interference (ISI) channels with a given metric decoding rule. Specifically, it is assumed that the mismatched decoder has an incorrect assumption on the impulse response function. The mismatch capacity is the highest achievable rate for a given decoding rule. Existing lower bounds to the mismatch capacity for channels an… ▽ More

    Submitted 19 June, 2017; originally announced June 2017.

  25. arXiv:1701.03119  [pdf, ps, other

    cs.IT

    How to Quantize $n$ Outputs of a Binary Symmetric Channel to $n-1$ Bits?

    Authors: Wasim Huleihel, Or Ordentlich

    Abstract: Suppose that $Y^n$ is obtained by observing a uniform Bernoulli random vector $X^n$ through a binary symmetric channel with crossover probability $α$. The "most informative Boolean function" conjecture postulates that the maximal mutual information between $Y^n$ and any Boolean function $\mathrm{b}(X^n)$ is attained by a dictator function. In this paper, we consider the "complementary" case in whi… ▽ More

    Submitted 2 May, 2017; v1 submitted 11 January, 2017; originally announced January 2017.

    Comments: 5 pages, accepted ISIT 2017

  26. arXiv:1508.05726   

    cs.IT

    Codewords With Memory Improve Achievable Rate Regions of the Memoryless Gaussian Interference Channel

    Authors: Wasim Huleihel, Neri Merhav

    Abstract: The two-user Gaussian interference channel (GIC) has been extensively studied in the literature during the last four decades. The full characterization of the capacity region of the GIC is a long-standing open problem, except the case of strong or very strong interference. For general GIC's, many inner bounds have been provided over the years, among of them, the Han-Kobayashi (HK) region, is the m… ▽ More

    Submitted 8 April, 2018; v1 submitted 24 August, 2015; originally announced August 2015.

    Comments: The results of this paper are not relevant anymore as it turns out that memory cannot improve the Han-Kobayashi region with optimized power control, as is shown in "http://chandra.ie.cuhk.edu.hk/pub/papers/IC/Col-G.pdf"

  27. arXiv:1503.02389  [pdf, ps, other

    cs.IT

    Random Coding Error Exponents for the Two-User Interference Channel

    Authors: Wasim Huleihel, Neri Merhav

    Abstract: This paper is about deriving lower bounds on the error exponents for the two-user interference channel under the random coding regime for several ensembles. Specifically, we first analyze the standard random coding ensemble, where the codebooks are comprised of independently and identically distributed (i.i.d.) codewords. For this ensemble, we focus on optimum decoding, which is in contrast to oth… ▽ More

    Submitted 20 June, 2017; v1 submitted 9 March, 2015; originally announced March 2015.

    Comments: accepted IEEE Transactions on Information Theory

  28. arXiv:1410.7005  [pdf, ps, other

    cs.IT

    Erasure/List Random Coding Error Exponents Are Not Universally Achievable

    Authors: Wasim Huleihel, Nir Weinberger, Neri Merhav

    Abstract: We study the problem of universal decoding for unknown discrete memoryless channels in the presence of erasure/list option at the decoder, in the random coding regime. Specifically, we harness a universal version of Forney's classical erasure/list decoder developed in earlier studies, which is based on the competitive minimax methodology, and guarantees universal achievability of a certain fractio… ▽ More

    Submitted 22 June, 2017; v1 submitted 26 October, 2014; originally announced October 2014.

    Comments: accepted to IEEE Trans. on Information Theory

  29. arXiv:1403.5874  [pdf, ps, other

    cs.IT

    On Compressive Sensing in Coding Problems: A Rigorous Approach

    Authors: Wasim Huleihel, Neri Merhav, Shlomo Shamai

    Abstract: We take an information theoretic perspective on a classical sparse-sampling noisy linear model and present an analytical expression for the mutual information, which plays central role in a variety of communications/processing problems. Such an expression was addressed previously either by bounds, by simulations and by the (non-rigorous) replica method. The expression of the mutual information is… ▽ More

    Submitted 24 March, 2014; originally announced March 2014.

  30. arXiv:1403.3786  [pdf, ps, other

    cs.IT

    Universal Decoding for Gaussian Intersymbol Interference Channels

    Authors: Wasim Huleihel, Neri Merhav

    Abstract: A universal decoding procedure is proposed for the intersymbol interference (ISI) Gaussian channels. The universality of the proposed decoder is in the sense of being independent of the various channel parameters, and at the same time, attaining the same random coding error exponent as the optimal maximum-likelihood (ML) decoder, which utilizes full knowledge of these unknown parameters. The propo… ▽ More

    Submitted 15 March, 2014; originally announced March 2014.

    Comments: Submitted to IEEE Trans. on Information Theory

  31. arXiv:1312.3417  [pdf, ps, other

    cs.IT

    Asymptotic MMSE Analysis Under Sparse Representation Modeling

    Authors: Wasim Huleihel, Neri Merhav

    Abstract: Compressed sensing is a signal processing technique in which data is acquired directly in a compressed form. There are two modeling approaches that can be considered: the worst-case (Hamming) approach and a statistical mechanism, in which the signals are modeled as random processes rather than as individual sequences. In this paper, the second approach is studied. In particular, we consider a mode… ▽ More

    Submitted 19 January, 2016; v1 submitted 12 December, 2013; originally announced December 2013.

  32. arXiv:1306.0094  [pdf, ps, other

    cs.IT cond-mat.stat-mech

    Analysis of Mismatched Estimation Errors Using Gradients of Partition Functions

    Authors: Wasim Huleihel, Neri Merhav

    Abstract: We consider the problem of signal estimation (denoising) from a statistical-mechanical perspective, in continuation to a recent work on the analysis of mean-square error (MSE) estimation using a direct relationship between optimum estimation and certain partition functions. The paper consists of essentially two parts. In the first part, using the aforementioned relationship, we derive single-lette… ▽ More

    Submitted 1 June, 2013; originally announced June 2013.

    Comments: 58 pages;Submitted to IEEE Trans. on Information Theory