Skip to main content

Showing 1–8 of 8 results for author: Ghaderi, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2307.08195  [pdf, other

    cs.CR

    Covert Communication in Autoencoder Wireless Systems

    Authors: Ali Mohammadi Teshnizi, Majid Ghaderi, Dennis Goeckel

    Abstract: Hiding the wireless communication by transmitter Alice to intended receiver Bob from a capable and attentive adversary Willie has been widely studied under the moniker "covert communications". However, when such covert communication is done in the presence of allowable system communications, there has been little study of both hiding the signal and preserving the performance of those allowable com… ▽ More

    Submitted 16 July, 2023; originally announced July 2023.

  2. arXiv:2108.12016  [pdf, other

    cs.LG

    DeepFlow: Abnormal Traffic Flow Detection Using Siamese Networks

    Authors: Sepehr Sabour, Sanjeev Rao, Majid Ghaderi

    Abstract: Nowadays, many cities are equipped with surveillance systems and traffic control centers to monitor vehicular traffic for road safety and efficiency. The monitoring process is mostly done manually which is inefficient and expensive. In recent years, several data-driven solutions have been proposed in the literature to automatically analyze traffic flow data using machine learning techniques. Howev… ▽ More

    Submitted 26 August, 2021; originally announced August 2021.

    Comments: 7 pages, 12 figures, 3 tables

  3. arXiv:1803.04100  [pdf, ps, other

    cs.NI

    Multi-Hop Routing in Covert Wireless Networks

    Authors: Azadeh Sheikholeslami, Majid Ghaderi, Don Towsley, Boulat A. Bash, Saikat Guha, Dennis Goeckel

    Abstract: In covert communication, Alice tries to communicate with Bob without being detected by a warden Willie. When the distance between Alice and Bob becomes large compared to the distance between Alice and Willie(s), the performance of covert communication will be degraded. In this case, multi-hop message transmission via intermediate relays can help to improve performance. Hence, in this work multi-ho… ▽ More

    Submitted 11 March, 2018; originally announced March 2018.

    Comments: Accepted in IEEE Transactions of Wireless Communications

  4. Energy-Efficient Secrecy in Wireless Networks Based on Random Jamming

    Authors: Azadeh Sheikholeslami, Majid Ghaderi, Hossein Pishro-Nik, Dennis Goeckel

    Abstract: This paper considers secure energy-efficient routing in the presence of multiple passive eavesdroppers. Previous work in this area has considered secure routing assuming probabilistic or exact knowledge of the location and channel-state-information (CSI) of each eavesdropper. In wireless networks, however, the locations and CSIs of passive eavesdroppers are not known, making it challenging to guar… ▽ More

    Submitted 15 March, 2017; originally announced March 2017.

  5. Energy-Efficient Routing in Wireless Networks in the Presence of Jamming

    Authors: Azadeh Sheikholeslami, Majid Ghaderi, Hossein Pishro-Nik, Dennis Goeckel

    Abstract: The effectiveness and simple implementation of physical layer jammers make them an essential threat for wireless networks. In a multihop wireless network, where jammers can interfere with the transmission of user messages at intermediate nodes along the path, one can employ jamming oblivious routing and then employ physical-layer techniques (e.g. spread spectrum) to suppress jamming. However, wher… ▽ More

    Submitted 13 September, 2016; v1 submitted 13 November, 2014; originally announced November 2014.

    Journal ref: IEEE Transactions on Wireless Communications, 2016

  6. arXiv:1307.7164  [pdf, ps, other

    cs.NI

    On the Scalability of Reliable Data Transfer in High Speed Networks

    Authors: Majid Ghaderi, Don Towsley

    Abstract: This paper considers reliable data transfer in a high-speed network (HSN) in which the per-connection capacity is very large. We focus on sliding window protocols employing selective repeat for reliable data transfer and study two reliability mechanisms based on ARQ and FEC. The question we ask is which mechanism is more suitable for an HSN in which the scalability of reliable data transfer in ter… ▽ More

    Submitted 26 July, 2013; originally announced July 2013.

  7. arXiv:1304.2688  [pdf, ps, other

    cs.NI cs.CR cs.IT

    Efficient Wireless Security Through Jamming, Coding and Routing

    Authors: Majid Ghaderi, Dennis Goeckel, Ariel Orda, Mostafa Dehghan

    Abstract: There is a rich recent literature on how to assist secure communication between a single transmitter and receiver at the physical layer of wireless networks through techniques such as cooperative jamming. In this paper, we consider how these single-hop physical layer security techniques can be extended to multi-hop wireless networks and show how to augment physical layer security techniques with h… ▽ More

    Submitted 9 April, 2013; originally announced April 2013.

    Report number: CPSC Technical Report 2012-1027-10

  8. arXiv:1008.2322  [pdf, ps, other

    math-ph cs.CE math.NA physics.comp-ph physics.flu-dyn

    An approximate solution of the MHD Falkner-Skan flow by Hermite functions pseudospectral method

    Authors: K. Parand, A. R. Rezaei, S. M. Ghaderi

    Abstract: Based on a new approximation method, namely pseudospectral method, a solution for the three order nonlinear ordinary differential laminar boundary layer Falkner-Skan equation has been obtained on the semi-infinite domain. The proposed approach is equipped by the orthogonal Hermite functions that have perfect properties to achieve this goal. This method solves the problem on the semi-infinite domai… ▽ More

    Submitted 16 August, 2010; v1 submitted 13 August, 2010; originally announced August 2010.

    Comments: 15 pages, 4 figures; Published online in the journal of "Communications in Nonlinear Science and Numerical Simulation"

    MSC Class: 76M22; 33C45; 65L60

    Journal ref: Commun Nonlinear Sci Numer Simulat 16 (2011) 274-283