Skip to main content

Showing 1–19 of 19 results for author: Manshaei, M H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2308.10584  [pdf, other

    cs.LG cs.NI eess.SP

    RADIANCE: Radio-Frequency Adversarial Deep-learning Inference for Automated Network Coverage Estimation

    Authors: Sopan Sarkar, Mohammad Hossein Manshaei, Marwan Krunz

    Abstract: Radio-frequency coverage maps (RF maps) are extensively utilized in wireless networks for capacity planning, placement of access points and base stations, localization, and coverage estimation. Conducting site surveys to obtain RF maps is labor-intensive and sometimes not feasible. In this paper, we propose radio-frequency adversarial deep-learning inference for automated network coverage estimati… ▽ More

    Submitted 21 August, 2023; originally announced August 2023.

    Comments: 6 pages, 6 figures

  2. arXiv:2111.10261  [pdf, other

    cs.GT cs.NI

    Optimal Association Strategy of Multi-gateway Wireless Sensor Networks Against Smart Jammers

    Authors: Mohammad Reza Heidarpour, Mohammad Hossein Manshaei

    Abstract: Engineers have numerous low-power wireless sensor devices in the current network setup for the Internet of Things, such as ZigBee, LoRaWAN, ANT, or Bluetooth. These low-power wireless sensors are the best candidates to transfer and collect data. But they are all vulnerable to the physical jamming attack since it is not costly for the attackers to run low power jammer sources in these networks. Hav… ▽ More

    Submitted 18 November, 2021; originally announced November 2021.

  3. arXiv:2106.06976  [pdf, other

    cs.LG cs.AI cs.GT

    Game of GANs: Game-Theoretical Models for Generative Adversarial Networks

    Authors: Monireh Mohebbi Moghadam, Bahar Boroomand, Mohammad Jalali, Arman Zareian, Alireza DaeiJavad, Mohammad Hossein Manshaei, Marwan Krunz

    Abstract: Generative Adversarial Networks (GANs) have recently attracted considerable attention in the AI community due to its ability to generate high-quality data of significant statistical resemblance to real data. Fundamentally, GAN is a game between two neural networks trained in an adversarial manner to reach a zero-sum Nash equilibrium profile. Despite the improvement accomplished in GANs in the last… ▽ More

    Submitted 3 January, 2022; v1 submitted 13 June, 2021; originally announced June 2021.

    Comments: 18 pages, 5 Tables, 6 Figures, Review paper

  4. arXiv:2103.02676  [pdf, other

    cs.AI

    Efficient UAV Trajectory-Planning using Economic Reinforcement Learning

    Authors: Alvi Ataur Khalil, Alexander J Byrne, Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei

    Abstract: Advances in unmanned aerial vehicle (UAV) design have opened up applications as varied as surveillance, firefighting, cellular networks, and delivery applications. Additionally, due to decreases in cost, systems employing fleets of UAVs have become popular. The uniqueness of UAVs in systems creates a novel set of trajectory or path planning and coordination problems. Environments include many more… ▽ More

    Submitted 3 March, 2021; originally announced March 2021.

  5. arXiv:2102.08209  [pdf, other

    q-bio.NC cs.LG

    Modeling the Hallucinating Brain: A Generative Adversarial Framework

    Authors: Masoumeh Zareh, Mohammad Hossein Manshaei, Sayed Jalal Zahabi

    Abstract: This paper looks into the modeling of hallucination in the human's brain. Hallucinations are known to be causally associated with some malfunctions within the interaction of different areas of the brain involved in perception. Focusing on visual hallucination and its underlying causes, we identify an adversarial mechanism between different parts of the brain which are responsible in the process of… ▽ More

    Submitted 9 February, 2021; originally announced February 2021.

  6. arXiv:2005.05114  [pdf, other

    cs.CL cs.LG

    Evaluating Sparse Interpretable Word Embeddings for Biomedical Domain

    Authors: Mohammad Amin Samadi, Mohammad Sadegh Akhondzadeh, Sayed Jalal Zahabi, Mohammad Hossein Manshaei, Zeinab Maleki, Payman Adibi

    Abstract: Word embeddings have found their way into a wide range of natural language processing tasks including those in the biomedical domain. While these vector representations successfully capture semantic and syntactic word relations, hidden patterns and trends in the data, they fail to offer interpretability. Interpretability is a key means to justification which is an integral part when it comes to bi… ▽ More

    Submitted 11 May, 2020; originally announced May 2020.

  7. arXiv:2004.14826  [pdf, other

    cs.CR cs.CY cs.LG stat.ML

    Wide-AdGraph: Detecting Ad Trackers with a Wide Dependency Chain Graph

    Authors: Amir Hossein Kargaran, Mohammad Sadegh Akhondzadeh, Mohammad Reza Heidarpour, Mohammad Hossein Manshaei, Kave Salamatian, Masoud Nejad Sattary

    Abstract: Websites use third-party ads and tracking services to deliver targeted ads and collect information about users that visit them. These services put users' privacy at risk, and that is why users' demand for blocking these services is growing. Most of the blocking solutions rely on crowd-sourced filter lists manually maintained by a large community of users. In this work, we seek to simplify the upda… ▽ More

    Submitted 10 May, 2021; v1 submitted 29 April, 2020; originally announced April 2020.

    Comments: 9 pages, 7 figures, To appear in the 13th ACM Web Science Conference 2021 (WebSci '21), June 2021

  8. arXiv:2003.13675  [pdf, other

    cs.NI cs.GT

    On Coordination of Smart Grid and Cooperative Cloud Providers

    Authors: Monireh Mohebbi Moghaddam, Mohammad Hossein Manshaei, Mehdi Naderi Soorki, Walid Saad, Maziar Goudarzi, Dusit Niyato

    Abstract: Cooperative cloud providers in the form of cloud federations can potentially reduce their energy costs by exploiting electricity price fluctuations across different locations. In this environment, on the one hand, the electricity price has a significant influence on the federations formed, and, thus, on the profit earned by the cloud providers, and on the other hand, the cloud cooperation has an i… ▽ More

    Submitted 30 March, 2020; originally announced March 2020.

  9. arXiv:2002.06531  [pdf, other

    cs.CR

    On the Feasibility of Sybil Attacks in Shard-Based Permissionless Blockchains

    Authors: Tayebeh Rajab, Mohammad Hossein Manshaei, Mohammad Dakhilalian, Murtuza Jadliwala, Mohammad Ashiqur Rahman

    Abstract: Bitcoin's single leader consensus protocol (Nakamoto consensus) suffers from significant transaction throughput and network scalability issues due to the computational requirements of it Proof-of-Work (PoW) based leader selection strategy. To overcome this, committee-based approaches (e.g., Elastico) that partition the outstanding transaction set into shards and (randomly) select multiple committe… ▽ More

    Submitted 16 February, 2020; originally announced February 2020.

  10. arXiv:1912.10073  [pdf, other

    cs.NI cs.GT

    Strategic Defense against Stealthy Link Flooding Attacks: A Signaling Game Approach

    Authors: Abdullah Aydeger, Mohammad Hossein Manshaei, Mohammad Ashiqur Rahman, Kemal Akkaya

    Abstract: With the increasing diversity of Distributed Denial-of-Service (DDoS) attacks, it is becoming extremely challenging to design a fully protected network. For instance, Stealthy Link Flooding Attack (SLFA) is a variant of DDoS attacks that strives to block access to a target area by flooding a small set of links, and it is shown that it can bypass traditional DDoS defense mechanisms. One potential s… ▽ More

    Submitted 20 December, 2019; originally announced December 2019.

  11. arXiv:1911.03356  [pdf, other

    cs.CR cs.GT

    On Incentive Compatible Role-based Reward Distribution in Algorand

    Authors: Mehdi Fooladgar, Mohammad Hossein Manshaei, Murtuza Jadliwala, Mohammad Ashiqur Rahman

    Abstract: Algorand is a recent, open-source public or permissionless blockchain system that employs a novel proof-of-stake byzantine consensus protocol to efficiently scale the distributed transaction agreement problem to billions of users. In addition to being more democratic and energy-efficient, compared to popular protocols such as Bitcoin, Algorand also touts a much high transaction throughput. This pa… ▽ More

    Submitted 8 November, 2019; originally announced November 2019.

  12. arXiv:1910.12235  [pdf, other

    cs.CY

    Fostering Peer Learning through a New Game-Theoretical Approach in a Blended Learning Environment

    Authors: Seyede Fatemeh Noorani, Mohammad Hossein Manshaei, Mohammad Ali Montazeri, Behnaz Omoomi

    Abstract: Obtaining knowledge and skill achievement through peer learning can lead to higher academic achievement. However, peer learning implementation is not just about putting students together and ho** for the best. At its worst-designed, peer learning may result in one person doing all the effort for instance, or may fail to encourage the students to interact enough with the task and so enhance the t… ▽ More

    Submitted 27 October, 2019; originally announced October 2019.

    Comments: 36 pages, 7 figures, 9 tables

  13. arXiv:1904.13352  [pdf, other

    cs.GT cs.CR

    Analyzing Defense Strategies Against Mobile Information Leakages: A Game-Theoretic Approach

    Authors: Kavita Kumari, Murtuza Jadliwala, Anindya Maiti, Mohammad Hossein Manshaei

    Abstract: Abuse of zero-permission sensors on-board mobile and wearable devices to infer users' personal context and information is a well-known privacy threat that has received significant attention. Efforts towards protection mechanisms that prevent or limit the success of such threats, however, have been ad-hoc so far and have primarily focused on designing threat-specific customized defense mechanisms.… ▽ More

    Submitted 30 April, 2019; originally announced April 2019.

  14. arXiv:1809.07307  [pdf, other

    cs.GT

    A Game-Theoretic Analysis of Shard-Based Permissionless Blockchains

    Authors: Mohammad Hossein Manshaei, Murtuza Jadliwala, Anindya Maiti, Mahdi Fooladgar

    Abstract: Low transaction throughput and poor scalability are significant issues in public blockchain consensus protocols such as Bitcoins. Recent research efforts in this direction have proposed shard-based consensus protocols where the key idea is to split the transactions among multiple committees (or shards), which then process these shards or set of transactions in parallel. Such a parallel processing… ▽ More

    Submitted 24 September, 2018; v1 submitted 19 September, 2018; originally announced September 2018.

  15. arXiv:1808.02637  [pdf, other

    cs.GT cs.NI

    Social Community-Aware Content Placement in Wireless Device-to-Device Communication Networks

    Authors: Mehdi Naderi Soorki, Walid Saad, Mohammad Hossein Manshaei, Hossein Saidi

    Abstract: In this paper, a novel framework for optimizing the caching of popular user content at the level of wireless user equipments (UEs) is proposed. The goal is to improve content offloading over wireless device-to-device (D2D) communication links. In the considered network, users belong to different social communities while their UEs form a single multi-hop D2D network. The proposed framework allows t… ▽ More

    Submitted 8 August, 2018; originally announced August 2018.

  16. arXiv:1707.07759  [pdf, other

    cs.GT cs.NI

    Stochastic Coalitional Games for Cooperative Random Access in M2M Communications

    Authors: Mehdi Naderi Soorki, Walid Saad, Mohammad Hossein Manshaei, Hossein Saidi

    Abstract: In this paper, the problem of random access contention between machine type devices (MTDs) in the uplink of a wireless cellular network is studied. In particular, the possibility of forming cooperative groups to coordinate the MTDs' requests for the random access channel (RACH) is analyzed. The problem is formulated as a stochastic coalition formation game in which the MTDs are the players that se… ▽ More

    Submitted 24 July, 2017; originally announced July 2017.

  17. arXiv:1608.07632  [pdf, other

    cs.IT

    Resource Allocation for Machine-to-Machine Communications with Unmanned Aerial Vehicles

    Authors: Mehdi Naderi Soorki, Mohammad Mozaffari, Walid Saad, Mohammad Hossein Manshaei, Hossein Saidi

    Abstract: In this paper, a novel framework for power-efficient, cluster-based machine-to-machine (M2M) communications is proposed. In the studied model, a number of unmanned aerial vehicles (UAVs) are used as aerial base stations to collect data from the cluster heads (CHs) of a set of M2M clusters. To minimize the CHs' transmit power while satisfying the rate requirements of M2M devices, an optimal schedul… ▽ More

    Submitted 26 August, 2016; originally announced August 2016.

    Comments: Accepted in IEEE GLOBECOM Workshop

  18. arXiv:1606.02373  [pdf, other

    cs.CR

    P4QS: A Peer to Peer Privacy Preserving Query Service for Location-Based Mobile Applications

    Authors: Meysam Ghaffari, Nasser Ghadiri, Mohammad Hossein Manshaei, Mehran Sadeghi Lahijani

    Abstract: The location-based services provide an interesting combination of cyber and physical worlds. However, they can also threaten the users' privacy. Existing privacy preserving protocols require trusted nodes, with serious security and computational bottlenecks. In this paper, we propose a novel distributed anonymizing protocol based on peer-to-peer architecture. Each mobile node is responsible for an… ▽ More

    Submitted 7 June, 2016; originally announced June 2016.

  19. arXiv:1601.06762  [pdf, other

    cs.IT cs.GT cs.NI

    Energy-Aware Optimization and Mechanism Design for Cellular Device-to-Device Local Area Networks

    Authors: Mehdi Naderi Soorki, Mohammad Yaghini, Mohammad Hossein Manshaei, Walid Saad, Hossein Saidi

    Abstract: In a device-to-device (D2D) local area network (LAN), mobile users (MUs) must cooperate to download common real-time content from a wireless cellular network. However, sustaining such D2D LANs over cellular networks requires the introduction of mechanisms that will incentivize the MUs to cooperate. In this paper, the problem of energy-aware D2D LAN formation over cellular networks is studied. The… ▽ More

    Submitted 25 January, 2016; originally announced January 2016.

    Comments: To appear in the 50th Annual Conference on Information Sciences and Systems (CISS), Princeton, New Jersey, March 2016