Skip to main content

Showing 1–8 of 8 results for author: Moradikia, M

.
  1. arXiv:2312.08181  [pdf

    eess.SP

    Adversarial Attacks on Graph Neural Networks based Spatial Resource Management in P2P Wireless Communications

    Authors: Ahmad Ghasemi, Ehsan Zeraatkar, Majid Moradikia, Seyed, Zekavat

    Abstract: This paper introduces adversarial attacks targeting a Graph Neural Network (GNN) based radio resource management system in point to point (P2P) communications. Our focus lies on perturbing the trained GNN model during the test phase, specifically targeting its vertices and edges. To achieve this, four distinct adversarial attacks are proposed, each accounting for different constraints, and aiming… ▽ More

    Submitted 13 December, 2023; originally announced December 2023.

  2. Secure SWIPT in the Multiuser STAR-RIS Aided MISO Rate Splitting Downlink

    Authors: Hamid Reza Hashempour, Hamed Bastami, Majid Moradikia, Seyed A. Zekavat, Hamid Behroozi, Gilberto Berardinelli, A. Lee Swindlehurst

    Abstract: Recently, simultaneously transmitting and reflecting reconfigurable intelligent surfaces (STAR-RISs) have emerged as a novel technology that provides 360 coverage and new degrees-of-freedom (DoFs). They are also capable of manipulating signal propagation and simultaneous wireless information and power transfer (SWIPT). This paper introduces a novel STAR-RIS-aided secure SWIPT system for downlink m… ▽ More

    Submitted 2 June, 2024; v1 submitted 16 November, 2022; originally announced November 2022.

    Comments: 16 pages, journal paper

  3. arXiv:2210.03926  [pdf, ps, other

    cs.IT eess.SP

    Secrecy Rate of the Cooperative RSMA-Aided UAV Downlink Relying on Optimal Relay Selection

    Authors: Hamed Bastami, Majid Moradikia, Hamid Behroozi, Lajos Hanzo

    Abstract: The Cooperative Rate-Splitting (CRS) scheme, proposed evolves from conventional Rate Splitting (RS) and relies on forwarding a portion of the RS message by the relaying users. In terms of secrecy enhancement, it has been shown that CRS outperforms its non-cooperative counterpart for a two-user Multiple Input Single Output (MISO) Broadcast Channel (BC). Given the massive connectivity requirement of… ▽ More

    Submitted 8 October, 2022; originally announced October 2022.

    Comments: arXiv admin note: text overlap with arXiv:1910.07843 by other authors

  4. arXiv:2209.12591  [pdf, ps, other

    cs.IT eess.SP

    Large-Scale Rate-Splitting Multiple Access in Uplink UAV Networks: Effective Secrecy Throughput Maximization Under Limited Feedback Channel

    Authors: Hamed Bastami, Hamid Behroozi, Majid Moradikia, Ahmed Abdelhadi, Derrick Wing Kwan Ngand, Lajos Hanzo

    Abstract: UAVs are capable of improving the performance of next generation wireless systems. Specifically, UAVs can be exploited as aerial base-stations (UAV-BS) for supporting legitimate ground users in remote uncovered areas or in environments temporarily requiring high capacity. However, their communication performance is prone to both channel estimation errors and potential eavesdrop**. Hence, we inve… ▽ More

    Submitted 26 September, 2022; originally announced September 2022.

  5. arXiv:2205.15743  [pdf, other

    cs.LG cs.AI cs.NI

    Mixture GAN For Modulation Classification Resiliency Against Adversarial Attacks

    Authors: Eyad Shtaiwi, Ahmed El Ouadrhiri, Majid Moradikia, Salma Sultana, Ahmed Abdelhadi, Zhu Han

    Abstract: Automatic modulation classification (AMC) using the Deep Neural Network (DNN) approach outperforms the traditional classification techniques, even in the presence of challenging wireless channel environments. However, the adversarial attacks cause the loss of accuracy for the DNN-based AMC by injecting a well-designed perturbation to the wireless channels. In this paper, we propose a novel generat… ▽ More

    Submitted 29 May, 2022; originally announced May 2022.

  6. arXiv:2101.02749  [pdf, other

    eess.SP

    Secrecy Rate Maximization for Hardware Impaired Untrusted Relaying Network with Deep Learning

    Authors: Hamed Bastami, Majid Moradikia, Hamid Behroozi, Rodrigo C. de Lamare, Ahmed Abdelhadi, Zhigou Ding

    Abstract: This paper investigates the physical layer security design of an untrusted relaying network where the source node coexists with a multi-antenna eavesdropper (Eve). While the communication relies on untrustworthy relay nodes to increase reliability, we aim to protect the confidentiality of information against combined eavesdrop** attacks performed by both untrusted relay nodes and Eve. Taking int… ▽ More

    Submitted 7 January, 2021; originally announced January 2021.

    Comments: 31 pages, 17 figures

  7. Secure mm-Wave Communications with Imperfect Hardware and Uncertain Eavesdropper Location

    Authors: Saeed Mashdour, Majid Moradikia, Phee Lep Yeoh

    Abstract: This paper examines the secrecy performance of millimeter-wave (mm-Wave) communications with imperfect hardware and uncertain eavesdropper location. We consider a multiple-antenna source communicating with a single-antenna destination using masked beamforming to transmit the information signals with artificial noise (AN) in the presence of a passive eavesdropper (Eve). For this system, we derive n… ▽ More

    Submitted 11 May, 2020; originally announced May 2020.

    Journal ref: Transactions on Emerging Telecommunications Technologies. 2020

  8. arXiv:1709.01334  [pdf, ps, other

    cs.CR cs.IT

    Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks

    Authors: Ali Kuhestani, Abbas Mohammadi, Kai-Kit Wong, Phee Lep Yeoh, Majid Moradikia, Muhammad Ruhul Amin Khandaker

    Abstract: By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination and an untrusted amplify-and-forward (AF) relay. We assume that either the source or the destination is equipped with a large-scale multiple antennas (LSMA)… ▽ More

    Submitted 5 September, 2017; originally announced September 2017.

    Comments: 29 pages, 7 figures, Submitted to IEEE Transactions on Wireless Communications