Skip to main content

Showing 1–50 of 62 results for author: Mahdavifar, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.01401  [pdf, other

    cs.IT

    Finite-Length Analysis of Polar Secrecy Codes for Wiretap Channels

    Authors: Hessam Mahdavifar, Fariba Abbasi

    Abstract: In a classical wiretap channel setting, Alice communicates with Bob through a main communication channel, while her transmission also reaches an eavesdropper Eve through a wiretap channel. In this paper, we consider a general class of polar secrecy codes for wiretap channels and study their finite-length performance. In particular, bounds on the normalized mutual information security (MIS) leakage… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

  2. arXiv:2406.13243  [pdf, ps, other

    cs.IT

    Abelian Group Codes for Classical and Classical-Quantum Channels: One-shot and Asymptotic Rate Bounds

    Authors: James Chin-Jen Pang, Sandeep Pradhan, Hessam Mahdavifar

    Abstract: We study the problem of transmission of information over classical and classical-quantum channels in the one-shot regime where the underlying codes are constrained to be group codes. In the achievability part, we introduce a new input probability distribution that incorporates the encoding homomorphism and the underlying channel law. Using a random coding argument, we characterize the performance… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

    Comments: 41 pages

  3. arXiv:2406.02836  [pdf, other

    cs.CR cs.CV

    DREW : Towards Robust Data Provenance by Leveraging Error-Controlled Watermarking

    Authors: Mehrdad Saberi, Vinu Sankar Sadasivan, Arman Zarei, Hessam Mahdavifar, Soheil Feizi

    Abstract: Identifying the origin of data is crucial for data provenance, with applications including data ownership protection, media forensics, and detecting AI-generated content. A standard approach involves embedding-based retrieval techniques that match query data with entries in a reference dataset. However, this method is not robust against benign and malicious edits. To address this, we propose Data… ▽ More

    Submitted 20 June, 2024; v1 submitted 4 June, 2024; originally announced June 2024.

  4. arXiv:2405.04622  [pdf, other

    cs.IT

    Bounds on the Statistical Leakage-Resilience of Shamir's Secret Sharing

    Authors: Utkarsh Gupta, Hessam Mahdavifar

    Abstract: Secret sharing is an instrumental tool for sharing secret keys in distributed systems. In a classical threshold setting, this involves a dealer who has a secret/key, a set of parties/users to which shares of the secret are sent, and a threshold on the number of users whose presence is needed in order to recover the secret. In secret sharing, secure links with no leakage are often assumed between t… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

  5. arXiv:2404.09088  [pdf, other

    cs.CR

    Projective Systematic Authentication via Reed-Muller Codes

    Authors: Hsuan-Po Liu, Hessam Mahdavifar

    Abstract: In this paper, we study the problem of constructing projective systematic authentication schemes based on binary linear codes. In systematic authentication, a tag for authentication is generated and then appended to the information, also referred to as the source, to be sent from the sender. Existing approaches to leverage projective constructions focus primarily on codes over large alphabets, and… ▽ More

    Submitted 13 April, 2024; originally announced April 2024.

  6. arXiv:2402.06814  [pdf, other

    cs.IT

    High-Rate Fair-Density Parity-Check Codes

    Authors: Hessam Mahdavifar

    Abstract: We introduce fair-density parity-check (FDPC) codes targeting high-rate applications. In particular, we start with a base parity-check matrix $H_b$ of dimension $2 \sqrt{n} \times n$, where $n$ is the code block length, and the number of ones in each row and column of $H_b$ is equal to $\sqrt{n}$ and $2$, respectively. We propose a deterministic combinatorial method for picking the base matrix… ▽ More

    Submitted 9 February, 2024; originally announced February 2024.

  7. arXiv:2308.12544  [pdf, other

    cs.DC cs.CR cs.IT

    Analog Multi-Party Computing: Locally Differential Private Protocols for Collaborative Computations

    Authors: Hsuan-Po Liu, Mahdi Soleymani, Hessam Mahdavifar

    Abstract: We consider a fully-decentralized scenario in which no central trusted entity exists and all clients are honest-but-curious. The state-of-the-art approaches to this problem often rely on cryptographic protocols, such as multiparty computation (MPC), that require map** real-valued data to a discrete alphabet, specifically a finite field. These approaches, however, can result in substantial accura… ▽ More

    Submitted 18 October, 2023; v1 submitted 24 August, 2023; originally announced August 2023.

  8. arXiv:2308.11078  [pdf, other

    cs.IT

    Matrix Completion over Finite Fields: Bounds and Belief Propagation Algorithms

    Authors: Mahdi Soleymani, Qiang Liu, Hessam Mahdavifar, Laura Balzano

    Abstract: We consider the low rank matrix completion problem over finite fields. This problem has been extensively studied in the domain of real/complex numbers, however, to the best of authors' knowledge, there exists merely one efficient algorithm to tackle the problem in the binary field, due to Saunderson et al. [1]. In this paper, we improve upon the theoretical guarantees for the algorithm provided in… ▽ More

    Submitted 21 August, 2023; originally announced August 2023.

  9. arXiv:2308.04185  [pdf, other

    cs.IT cs.CR cs.DC cs.LG math.NA

    Iterative Sketching for Secure Coded Regression

    Authors: Neophytos Charalambides, Hessam Mahdavifar, Mert Pilanci, Alfred O. Hero III

    Abstract: Linear regression is a fundamental and primitive problem in supervised machine learning, with applications ranging from epidemiology to finance. In this work, we propose methods for speeding up distributed linear regression. We do so by leveraging randomized techniques, while also ensuring security and straggler resiliency in asynchronous distributed computing systems. Specifically, we randomly ro… ▽ More

    Submitted 31 March, 2024; v1 submitted 8 August, 2023; originally announced August 2023.

    Comments: 29 pages, 8 figures. arXiv admin note: substantial text overlap with arXiv:2201.08522

    MSC Class: 65B99; 68P20; 68P25; 68P27; 68P30; 94-10; 94A11; 94A16; 94B60 ACM Class: E.3; E.4; F.2.1; G.1.3

  10. arXiv:2303.09511  [pdf, other

    cs.IT eess.SP

    Capacity-achieving Polar-based Codes with Sparsity Constraints on the Generator Matrices

    Authors: James Chin-Jen Pang, Hessam Mahdavifar, S. Sandeep Pradhan

    Abstract: In this paper, we leverage polar codes and the well-established channel polarization to design capacity-achieving codes with a certain constraint on the weights of all the columns in the generator matrix (GM) while having a low-complexity decoding algorithm. We first show that given a binary-input memoryless symmetric (BMS) channel $W$ and a constant $s \in (0, 1]$, there exists a polarization ker… ▽ More

    Submitted 16 March, 2023; originally announced March 2023.

    Comments: 31 pages, single column. arXiv admin note: substantial text overlap with arXiv:2012.13977

  11. arXiv:2301.06251  [pdf, other

    cs.IT cs.AI cs.LG

    Machine Learning-Aided Efficient Decoding of Reed-Muller Subcodes

    Authors: Mohammad Vahid Jamali, Xiyang Liu, Ashok Vardhan Makkuva, Hessam Mahdavifar, Sewoong Oh, Pramod Viswanath

    Abstract: Reed-Muller (RM) codes achieve the capacity of general binary-input memoryless symmetric channels and are conjectured to have a comparable performance to that of random codes in terms of scaling laws. However, such results are established assuming maximum-likelihood decoders for general code parameters. Also, RM codes only admit limited sets of rates. Efficient decoders such as successive cancella… ▽ More

    Submitted 31 July, 2023; v1 submitted 15 January, 2023; originally announced January 2023.

    Comments: Accepted for publication in the Journal on Selected Areas in Information Theory. arXiv admin note: substantial text overlap with arXiv:2102.01671

  12. arXiv:2202.11257  [pdf, other

    cs.NI

    ML-Aided Collision Recovery for UHF-RFID Systems

    Authors: Talha Akyildiz, Raymond Ku, Nicholas Harder, Najme Ebrahimi, Hessam Mahdavifar

    Abstract: We propose a collision recovery algorithm with the aid of machine learning (ML-aided) for passive Ultra High Frequency (UHF) Radio Frequency Identification (RFID) systems. The proposed method aims at recovering the tags under collision to improve the system performance. We first estimate the number of tags from the collided signal by utilizing machine learning tools and show that the number of col… ▽ More

    Submitted 2 May, 2022; v1 submitted 22 February, 2022; originally announced February 2022.

  13. arXiv:2202.03654  [pdf, ps, other

    cs.IT

    Low-Complexity Decoding of a Class of Reed-Muller Subcodes for Low-Capacity Channels

    Authors: Mohammad Vahid Jamali, Mohammad Fereydounian, Hessam Mahdavifar, Hamed Hassani

    Abstract: We present a low-complexity and low-latency decoding algorithm for a class of Reed-Muller (RM) subcodes that are defined based on the product of smaller RM codes. More specifically, the input sequence is shaped as a multi-dimensional array, and the encoding over each dimension is done separately via a smaller RM encoder. Similarly, the decoding is performed over each dimension via a low-complexity… ▽ More

    Submitted 8 February, 2022; originally announced February 2022.

    Comments: Accepted for presentation in the 2022 IEEE International Conference on Communications (ICC)

  14. arXiv:2202.03472  [pdf, other

    cs.IT eess.SP

    New Bounds on the Size of Binary Codes with Large Minimum Distance

    Authors: James Chin-Jen Pang, Hessam Mahdavifar, S. Sandeep Pradhan

    Abstract: Let $A(n, d)$ denote the maximum size of a binary code of length $n$ and minimum Hamming distance $d$. Studying $A(n, d)$, including efforts to determine it as well to derive bounds on $A(n, d)$ for large $n$'s, is one of the most fundamental subjects in coding theory. In this paper, we explore new lower and upper bounds on $A(n, d)$ in the large-minimum distance regime, in particular, when… ▽ More

    Submitted 23 May, 2023; v1 submitted 7 February, 2022; originally announced February 2022.

    Comments: 23 pages

  15. arXiv:2201.09955  [pdf, other

    cs.IT

    A New Algebraic Approach for String Reconstruction from Substring Compositions

    Authors: Utkarsh Gupta, Hessam Mahdavifar

    Abstract: We consider the problem of binary string reconstruction from the multiset of its substring compositions, i.e., referred to as the substring composition multiset, first introduced and studied by Acharya et al. We introduce a new algorithm for the problem of string reconstruction from its substring composition multiset which relies on the algebraic properties of the equivalent bivariate polynomial f… ▽ More

    Submitted 1 June, 2023; v1 submitted 24 January, 2022; originally announced January 2022.

  16. arXiv:2201.08522  [pdf, other

    cs.IT cs.CR eess.SP math.NA

    Orthonormal Sketches for Secure Coded Regression

    Authors: Neophytos Charalambides, Hessam Mahdavifar, Mert Pilanci, Alfred O. Hero III

    Abstract: In this work, we propose a method for speeding up linear regression distributively, while ensuring security. We leverage randomized sketching techniques, and improve straggler resilience in asynchronous systems. Specifically, we apply a random orthonormal matrix and then subsample in \textit{blocks}, to simultaneously secure the information and reduce the dimension of the regression problem. In ou… ▽ More

    Submitted 22 February, 2022; v1 submitted 20 January, 2022; originally announced January 2022.

    Comments: 3 figures, 5 pages excluding appendices

    MSC Class: 65F10; 65F45; 68W15; 68W20; 68W25; 68P27; 68P30; ACM Class: E.3; E.4; G.1.2; G.1.3

  17. arXiv:2110.15252  [pdf, other

    cs.LG cs.AI cs.CR

    Federated Learning with Heterogeneous Differential Privacy

    Authors: Nasser Aldaghri, Hessam Mahdavifar, Ahmad Beirami

    Abstract: Federated learning (FL) takes a first step towards privacy-preserving machine learning by training models while kee** client data local. Models trained using FL may still leak private client information through model updates during training. Differential privacy (DP) may be employed on model updates to provide privacy guarantees within FL, typically at the cost of degraded performance of the fin… ▽ More

    Submitted 14 January, 2023; v1 submitted 28 October, 2021; originally announced October 2021.

  18. arXiv:2109.10484  [pdf, ps, other

    cs.IT math.NA

    Generalized Fractional Repetition Codes for Binary Coded Computations

    Authors: Neophytos Charalambides, Hessam Mahdavifar, Alfred O. Hero III

    Abstract: This paper addresses the gradient coding and coded matrix multiplication problems in distributed optimization and coded computing. We present a numerically stable binary coding method which overcomes the drawbacks of the \textit{Fractional Repetition Coding} gradient coding method proposed by Tandon et al., and can also be leveraged by coded computing networks whose servers are of heterogeneous na… ▽ More

    Submitted 11 February, 2024; v1 submitted 21 September, 2021; originally announced September 2021.

    Comments: 27 pages, 2 tables

    MSC Class: 94B05; 68W15; 15A99 ACM Class: H.1.1; F.2.1; F.2.2

  19. arXiv:2109.09868  [pdf, other

    cs.LG cs.DC cs.IT

    ApproxIFER: A Model-Agnostic Approach to Resilient and Robust Prediction Serving Systems

    Authors: Mahdi Soleymani, Ramy E. Ali, Hessam Mahdavifar, A. Salman Avestimehr

    Abstract: Due to the surge of cloud-assisted AI services, the problem of designing resilient prediction serving systems that can effectively cope with stragglers/failures and minimize response delays has attracted much interest. The common approach for tackling this problem is replication which assigns the same prediction task to multiple workers. This approach, however, is very inefficient and incurs signi… ▽ More

    Submitted 20 September, 2021; originally announced September 2021.

  20. arXiv:2108.12920  [pdf, other

    cs.IT cs.AI

    KO codes: Inventing Nonlinear Encoding and Decoding for Reliable Wireless Communication via Deep-learning

    Authors: Ashok Vardhan Makkuva, Xiyang Liu, Mohammad Vahid Jamali, Hessam Mahdavifar, Sewoong Oh, Pramod Viswanath

    Abstract: Landmark codes underpin reliable physical layer communication, e.g., Reed-Muller, BCH, Convolution, Turbo, LDPC and Polar codes: each is a linear code and represents a mathematical breakthrough. The impact on humanity is huge: each of these codes has been used in global wireless communication standards (satellite, WiFi, cellular). Reliability of communication over the classical additive white Gaus… ▽ More

    Submitted 29 August, 2021; originally announced August 2021.

  21. arXiv:2106.12122  [pdf, ps, other

    cs.IT

    Hybrid Non-Binary Repeated Polar Codes

    Authors: Fariba Abbasi, Hessam Mahdavifar, Emanuele Viterbo

    Abstract: Concatenating the state-of-the-art codes at moderate rates with repetition codes has emerged as a practical solution deployed in various standards for ultra-low-power devices such as in Internet-of-Things (IoT) networks. In this paper, we propose a novel concatenation mechanism for such applications which need to operate at very low signal-to-noise ratio (SNR) regime. In the proposed scheme, the o… ▽ More

    Submitted 23 March, 2022; v1 submitted 22 June, 2021; originally announced June 2021.

  22. arXiv:2103.01503  [pdf, other

    cs.IT cs.DC

    Coded Computing via Binary Linear Codes: Designs and Performance Limits

    Authors: Mahdi Soleymani, Mohammad Vahid Jamali, Hessam Mahdavifar

    Abstract: We consider the problem of coded distributed computing where a large linear computational job, such as a matrix multiplication, is divided into $k$ smaller tasks, encoded using an $(n,k)$ linear code, and performed over $n$ distributed nodes. The goal is to reduce the average execution time of the computational job. We provide a connection between the problem of characterizing the average executio… ▽ More

    Submitted 4 October, 2021; v1 submitted 2 March, 2021; originally announced March 2021.

    Comments: Accepted for publication in IEEE Journal on Selected Areas in Information Theory. arXiv admin note: substantial text overlap with arXiv:1906.10105

  23. arXiv:2102.01671  [pdf, ps, other

    cs.IT

    Reed-Muller Subcodes: Machine Learning-Aided Design of Efficient Soft Recursive Decoding

    Authors: Mohammad Vahid Jamali, Xiyang Liu, Ashok Vardhan Makkuva, Hessam Mahdavifar, Sewoong Oh, Pramod Viswanath

    Abstract: Reed-Muller (RM) codes are conjectured to achieve the capacity of any binary-input memoryless symmetric (BMS) channel, and are observed to have a comparable performance to that of random codes in terms of scaling laws. On the negative side, RM codes lack efficient decoders with performance close to that of a maximum likelihood decoder for general parameters. Also, they only admit certain discrete… ▽ More

    Submitted 2 February, 2021; originally announced February 2021.

  24. arXiv:2101.11653  [pdf, other

    cs.IT cs.DC cs.LG

    List-Decodable Coded Computing: Breaking the Adversarial Toleration Barrier

    Authors: Mahdi Soleymani, Ramy E. Ali, Hessam Mahdavifar, A. Salman Avestimehr

    Abstract: We consider the problem of coded computing, where a computational task is performed in a distributed fashion in the presence of adversarial workers. We propose techniques to break the adversarial toleration threshold barrier previously known in coded computing. More specifically, we leverage list-decoding techniques for folded Reed-Solomon codes and propose novel algorithms to recover the correct… ▽ More

    Submitted 19 August, 2021; v1 submitted 27 January, 2021; originally announced January 2021.

  25. arXiv:2012.15721  [pdf, other

    cs.LG cs.AI cs.CR cs.IT

    Coded Machine Unlearning

    Authors: Nasser Aldaghri, Hessam Mahdavifar, Ahmad Beirami

    Abstract: There are applications that may require removing the trace of a sample from the system, e.g., a user requests their data to be deleted, or corrupted data is discovered. Simply removing a sample from storage units does not necessarily remove its entire trace since downstream machine learning models may store some information about the samples used to train them. A sample can be perfectly unlearned… ▽ More

    Submitted 15 June, 2021; v1 submitted 31 December, 2020; originally announced December 2020.

    Comments: Accepted for publication in IEEE Access

  26. arXiv:2012.13977  [pdf, other

    cs.IT

    Capacity-achieving Polar-based LDGM Codes

    Authors: James Chin-Jen Pang, Hessam Mahdavifar, S. Sandeep Pradhan

    Abstract: In this paper, we study codes with sparse generator matrices. More specifically, low-density generator matrix (LDGM) codes with a certain constraint on the weight of the columns in the generator matrix are considered. In this paper, it is first shown that when a BMS channel W and a constant s>0 are given, there exists a polarization kernel such that the corresponding polar code is capacity-achievi… ▽ More

    Submitted 27 June, 2022; v1 submitted 27 December, 2020; originally announced December 2020.

    Comments: Extended version, now includes moderate-block length comparison with the RLE. arXiv admin note: text overlap with arXiv:2001.11986

  27. arXiv:2010.16144  [pdf, ps, other

    cs.IT

    Polar Coded Repetition for Low-Capacity Channels

    Authors: Fariba Abbasi, Hessam Mahdavifar, Emanuele Viterbo

    Abstract: Constructing efficient low-rate error-correcting codes with low-complexity encoding and decoding have become increasingly important for applications involving ultra-low-power devices such as Internet-of-Things (IoT) networks. To this end, schemes based on concatenating the state-of-the-art codes at moderate rates with repetition codes have emerged as practical solutions deployed in various standar… ▽ More

    Submitted 30 October, 2020; originally announced October 2020.

  28. arXiv:2008.08565  [pdf, other

    cs.IT cs.DC cs.LG

    Analog Lagrange Coded Computing

    Authors: Mahdi Soleymani, Hessam Mahdavifar, A. Salman Avestimehr

    Abstract: A distributed computing scenario is considered, where the computational power of a set of worker nodes is used to perform a certain computation task over a dataset that is dispersed among the workers. Lagrange coded computing (LCC), proposed by Yu et al., leverages the well-known Lagrange polynomial to perform polynomial evaluation of the dataset in such a scenario in an efficient parallel fashion… ▽ More

    Submitted 29 January, 2021; v1 submitted 19 August, 2020; originally announced August 2020.

  29. arXiv:2007.13571  [pdf, ps, other

    cs.IT

    Covert Millimeter-Wave Communication: Design Strategies and Performance Analysis

    Authors: Mohammad Vahid Jamali, Hessam Mahdavifar

    Abstract: In this paper, we investigate covert communication over millimeter-wave (mmWave) frequencies. In particular, a mmWave transmitter, referred to as Alice, attempts to reliably communicate to a receiver, referred to as Bob, while hiding the existence of communication from a warden, referred to as Willie. In this regard, operating over the mmWave bands not only increases the covertness thanks to dir… ▽ More

    Submitted 24 October, 2021; v1 submitted 24 July, 2020; originally announced July 2020.

    Comments: Accepted for publication in the IEEE Transactions on Wireless Communications. arXiv admin note: substantial text overlap with arXiv:1908.07591

  30. arXiv:2007.08803  [pdf, other

    cs.LG cs.CR cs.DC cs.IT stat.ML

    Privacy-Preserving Distributed Learning in the Analog Domain

    Authors: Mahdi Soleymani, Hessam Mahdavifar, A. Salman Avestimehr

    Abstract: We consider the critical problem of distributed learning over data while kee** it private from the computational servers. The state-of-the-art approaches to this problem rely on quantizing the data into a finite field, so that the cryptographic approaches for secure multiparty computing can then be employed. These approaches, however, can result in substantial accuracy losses due to fixed-point… ▽ More

    Submitted 17 July, 2020; originally announced July 2020.

  31. arXiv:2006.06917  [pdf, ps, other

    cs.IT eess.SP

    Massive Coded-NOMA for Low-Capacity Channels: A Low-Complexity Recursive Approach

    Authors: Mohammad Vahid Jamali, Hessam Mahdavifar

    Abstract: In this paper, we present a low-complexity recursive approach for massive and scalable code-domain nonorthogonal multiple access (NOMA) with applications to emerging low-capacity scenarios. The problem definition in this paper is inspired by three major requirements of the next generations of wireless networks. Firstly, the proposed scheme is particularly beneficial in low-capacity regimes which i… ▽ More

    Submitted 10 March, 2021; v1 submitted 11 June, 2020; originally announced June 2020.

    Comments: Accepted for publication in the IEEE Transactions on Communications

  32. arXiv:2001.11986  [pdf, ps, other

    eess.SP cs.DC cs.IT

    Capacity-achieving Polar-based LDGM Codes with Crowdsourcing Applications

    Authors: James Chin-Jen Pang, Hessam Mahdavifar, S. Sandeep Pradhan

    Abstract: In this paper we study codes with sparse generator matrices. More specifically, codes with a certain constraint on the weight of all the columns in the generator matrix are considered. The end result is the following. For any binary-input memoryless symmetric (BMS) channel and any epsilon > 2 epsilon*, where epsilon^* = \frac{1}{6}-\frac{5}{3}\log{\frac{4}{3}} \approx 0.085, we show an explicit se… ▽ More

    Submitted 31 January, 2020; originally announced January 2020.

    Comments: 12 pages, 2 tables

  33. arXiv:2001.11449  [pdf, ps, other

    cs.IT eess.SP

    Numerically Stable Binary Gradient Coding

    Authors: Neophytos Charalambides, Hessam Mahdavifar, Alfred O. Hero III

    Abstract: A major hurdle in machine learning is scalability to massive datasets. One approach to overcoming this is to distribute the computational tasks among several workers. \textit{Gradient coding} has been recently proposed in distributed optimization to compute the gradient of an objective function using multiple, possibly unreliable, worker nodes. By designing distributed coded schemes, gradient code… ▽ More

    Submitted 15 September, 2020; v1 submitted 30 January, 2020; originally announced January 2020.

    Comments: Conference

    MSC Class: 94Bxx; 94B60

  34. arXiv:1910.13567  [pdf, other

    eess.SP cs.IT

    Cell Association via Boundary Detection: A Scalable Approach Based on Data-Driven Random Features

    Authors: Yinsong Wang, Hessam Mahdavifar, Kamran Entesari, Shahin Shahrampour

    Abstract: The problem of cell association is considered for cellular users present in the field. This has become a challenging problem with the deployment of 5G networks which will share the sub-6 GHz bands with the legacy 4G networks. Instead of taking a network-controlled approach, which may not be scalable with the number of users and may introduce extra delays into the system, we propose a scalable solu… ▽ More

    Submitted 29 October, 2019; originally announced October 2019.

    Comments: 6 pages

  35. arXiv:1910.12178  [pdf, ps, other

    cs.IT

    Secret Key Generation via Pulse-Coupled Synchronization

    Authors: Hessam Mahdavifar, Najme Ebrahimi

    Abstract: A novel framework for sharing common randomness and generating secret keys in wireless networks is considered. In particular, a network of users equipped with pulse oscillators (POs) and coupling mechanisms in between is considered. Such mechanisms exist in synchronized biological and natural systems, and have been exploited to provide synchronization in distributed networks. We show that naturall… ▽ More

    Submitted 27 October, 2019; originally announced October 2019.

  36. Threshold-Secure Coding with Shared Key

    Authors: Nasser Aldaghri, Hessam Mahdavifar

    Abstract: Cryptographic protocols are often implemented at upper layers of communication networks, while error-correcting codes are employed at the physical layer. In this paper, we consider utilizing readily-available physical layer functions, such as encoders and decoders, together with shared keys to provide a threshold-type security scheme. To this end, we first consider a scenario where the effect of t… ▽ More

    Submitted 17 January, 2021; v1 submitted 29 September, 2019; originally announced September 2019.

  37. arXiv:1909.07533  [pdf, other

    cs.IT

    Analog Subspace Coding: A New Approach to Coding for Non-Coherent Wireless Networks

    Authors: Mahdi Soleymani, Hessam Mahdavifar

    Abstract: We provide a novel framework to study subspace codes for non-coherent communications in wireless networks. To this end, an analog operator channel is defined with inputs and outputs being subspaces of $\mathbb{C}^n$. Then a certain distance is defined to capture the performance of subspace codes in terms of their capability to recover from interference and rank-deficiency of the network. We also s… ▽ More

    Submitted 28 January, 2022; v1 submitted 16 September, 2019; originally announced September 2019.

  38. arXiv:1908.07591  [pdf, ps, other

    cs.IT

    Covert Millimeter-Wave Communication via a Dual-Beam Transmitter

    Authors: Mohammad Vahid Jamali, Hessam Mahdavifar

    Abstract: In this paper, we investigate covert communication over millimeter-wave (mmWave) frequencies. In particular, a dual-beam mmWave transmitter, comprised of two independent antenna arrays, attempts to reliably communicate to a receiver Bob when hiding the existence of transmission from a warden Willie. In this regard, operating over mmWave bands not only increases the covertness thanks to directional… ▽ More

    Submitted 20 August, 2019; originally announced August 2019.

  39. Physical Layer Secret Key Generation in Static Environments

    Authors: Nasser Aldaghri, Hessam Mahdavifar

    Abstract: Two legitimate parties, referred to as Alice and Bob, wish to generate secret keys from the wireless channel in the presence of an eavesdropper, referred to as Eve, in order to use such keys for encryption and decryption. In general, the secret key rate highly depends on the coherence time of the channel. In particular, a straightforward method of generating secret keys in static environments resu… ▽ More

    Submitted 13 February, 2020; v1 submitted 9 August, 2019; originally announced August 2019.

  40. arXiv:1906.10637  [pdf, ps, other

    stat.ML cs.IT cs.LG

    Coding for Crowdsourced Classification with XOR Queries

    Authors: James Chin-Jen Pang, Hessam Mahdavifar, S. Sandeep Pradhan

    Abstract: This paper models the crowdsourced labeling/classification problem as a sparsely encoded source coding problem, where each query answer, regarded as a code bit, is the XOR of a small number of labels, as source information bits. In this paper we leverage the connections between this problem and well-studied codes with sparse representations for the channel coding problem to provide querying scheme… ▽ More

    Submitted 31 January, 2020; v1 submitted 25 June, 2019; originally announced June 2019.

    Comments: 6 pages

  41. arXiv:1906.10105  [pdf, ps, other

    cs.IT cs.DC

    Coded Distributed Computing: Performance Limits and Code Designs

    Authors: Mohammad Vahid Jamali, Mahdi Soleymani, Hessam Mahdavifar

    Abstract: We consider the problem of coded distributed computing where a large linear computational job, such as a matrix multiplication, is divided into $k$ smaller tasks, encoded using an $(n,k)$ linear code, and performed over $n$ distributed nodes. The goal is to reduce the average execution time of the computational job. We provide a connection between the problem of characterizing the average executio… ▽ More

    Submitted 24 June, 2019; originally announced June 2019.

  42. arXiv:1903.00326  [pdf, ps, other

    cs.IT

    Uplink Non-Orthogonal Multiple Access over Mixed RF-FSO Systems

    Authors: Mohammad Vahid Jamali, Hessam Mahdavifar

    Abstract: In this paper, we consider a relay-assisted uplink non-orthogonal multiple access (NOMA) system. In this system, two radio frequency (RF) users are grouped for simultaneous transmissions, over each resource block, to an intermediate relay. The relay then forwards the amplified version of the users' aggregated signals, in the presence of multiuser interference, to a relatively far destination. In o… ▽ More

    Submitted 16 February, 2020; v1 submitted 1 March, 2019; originally announced March 2019.

    Comments: arXiv admin note: substantial text overlap with arXiv:1809.02893

  43. arXiv:1811.04322  [pdf, ps, other

    cs.IT

    Channel Coding at Low Capacity

    Authors: Mohammad Fereydounian, Hamed Hassani, Mohammad Vahid Jamali, Hessam Mahdavifar

    Abstract: Low-capacity scenarios have become increasingly important in the technology of the Internet of Things (IoT) and the next generation of wireless networks. Such scenarios require efficient and reliable transmission over channels with an extremely small capacity. Within these constraints, the state-of-the-art coding techniques may not be directly applicable. Moreover, the prior work on the finite-len… ▽ More

    Submitted 4 February, 2023; v1 submitted 10 November, 2018; originally announced November 2018.

    Comments: 52 pages

  44. arXiv:1809.02893  [pdf, ps, other

    cs.IT

    Outage Probability Analysis of Uplink NOMA over Ultra-High-Speed FSO-Backhauled Systems

    Authors: Mohammad Vahid Jamali, Seyed Mohammad Azimi-Abarghouyi, Hessam Mahdavifar

    Abstract: In this paper, we consider a relay-assisted uplink non-orthogonal multiple access (NOMA) system where two radio frequency (RF) users are grouped for simultaneous transmission, over each resource block, to an intermediate relay which forwards the amplified version of the users' aggregated signals in the presence of multiuser interference to a relatively far destination. In order to cope with the us… ▽ More

    Submitted 8 September, 2018; originally announced September 2018.

  45. arXiv:1804.05242  [pdf, other

    cs.IT

    A Low-Complexity Recursive Approach Toward Code-Domain NOMA for Massive Communications

    Authors: Mohammad Vahid Jamali, Hessam Mahdavifar

    Abstract: Nonorthogonal multiple access (NOMA) is a promising technology to meet the demands of the next generation wireless networks on massive connectivity, high throughput and reliability, improved fairness, and low latency. In this context, code-domain NOMA which attempts to serve $K$ users in $M\leq K$ orthogonal resource blocks, using a pattern matrix, is of utmost interest. However, extending the pat… ▽ More

    Submitted 14 April, 2018; originally announced April 2018.

  46. arXiv:1801.04384  [pdf, other

    cs.IT

    Distributed Multi-User Secret Sharing

    Authors: Mahdi Soleymani, Hessam Mahdavifar

    Abstract: We consider a distributed secret sharing system that consists of a dealer, $n$ storage nodes, and $m$ users. Each user is given access to a certain subset of storage nodes, where it can download the stored data. The dealer wants to securely convey a specific secret $s_j$ to user $j$ via storage nodes, for $j=1,2,...,m$. More specifically, two secrecy conditions are considered in this multi-user co… ▽ More

    Submitted 29 September, 2020; v1 submitted 13 January, 2018; originally announced January 2018.

  47. arXiv:1611.04203  [pdf, other

    cs.IT

    Polar Coding for Non-Stationary Channels

    Authors: Hessam Mahdavifar

    Abstract: The problem of polar coding for an arbitrary sequence of independent binary-input memoryless symmetric (BMS) channels $\left\{W_i\right\}_{i=1}^{N}$ is considered. The sequence of channels is assumed to be completely known to both the transmitter and the receiver (a coherent scenario). Also, at each code block transmission, each of the channels is used only once. In other words, a codeword of leng… ▽ More

    Submitted 25 August, 2020; v1 submitted 13 November, 2016; originally announced November 2016.

    Comments: accepted for publication in IEEE Transactions on Information Theory

  48. arXiv:1510.08204  [pdf, other

    cs.SI cs.GT math.OC

    Global Games with Noisy Information Sharing

    Authors: Hessam Mahdavifar, Ahmad Beirami, Behrouz Touri, Jeff S. Shamma

    Abstract: Global games form a subclass of games with incomplete information where a set of agents decide actions against a regime with an underlying fundamental $θ$ representing its power. Each agent has access to an independent noisy observation of $θ$. In order to capture the behavior of agents in a social network of information exchange we assume that agents share their observation in a noisy environment… ▽ More

    Submitted 28 October, 2017; v1 submitted 28 October, 2015; originally announced October 2015.

    Comments: Accepted to IEEE Transactions on Signal and Information Processing over Networks

  49. arXiv:1508.07698  [pdf, ps, other

    cs.IT

    Rate-Compatible Polar Codes for Wireless Channels

    Authors: Mostafa El-Khamy, Hsien-** Lin, Jungwon Lee, Hessam Mahdavifar, Inyup Kang

    Abstract: A design of rate-compatible polar codes suitable for HARQ communications is proposed in this paper. An important feature of the proposed design is that the puncturing order is chosen with low complexity on a base code of short length, which is then further polarized to the desired length. A practical rate-matching system that has the flexibility to choose any desired rate through puncturing or rep… ▽ More

    Submitted 31 August, 2015; originally announced August 2015.

    Comments: Accepted for publication at 2015 IEEE Global Communications Conference (Globecom)

  50. Relaxed Polar Codes

    Authors: Mostafa El-Khamy, Hessam Mahdavifar, Gennady Feygin, Jungwon Lee, Inyup Kang

    Abstract: Polar codes are the latest breakthrough in coding theory, as they are the first family of codes with explicit construction that provably achieve the symmetric capacity of discrete memoryless channels. Arıkan's polar encoder and successive cancellation decoder have complexities of $N \log N$, for code length $N$. Although, the complexity bound of $N \log N$ is asymptotically favorable, we report in… ▽ More

    Submitted 16 July, 2015; v1 submitted 24 January, 2015; originally announced January 2015.

    Comments: Conference version,Relaxed Channel Polarization for Reduced Complexity Polar Coding, accepted for presentation at IEEE Wireless Communications and Networking Conference WCNC 2015

    Journal ref: IEEE Transactions on Information Theory, 2017