Skip to main content

Showing 1–39 of 39 results for author: Motahari, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2310.00027  [pdf, ps, other

    stat.ML cs.LG

    Out-Of-Domain Unlabeled Data Improves Generalization

    Authors: Amir Hossein Saberi, Amir Najafi, Alireza Heidari, Mohammad Hosein Movasaghinia, Abolfazl Motahari, Babak H. Khalaj

    Abstract: We propose a novel framework for incorporating unlabeled data into semi-supervised classification problems, where scenarios involving the minimization of either i) adversarially robust or ii) non-robust loss functions have been considered. Notably, we allow the unlabeled samples to deviate slightly (in total variation sense) from the in-domain distribution. The core idea behind our framework is to… ▽ More

    Submitted 15 February, 2024; v1 submitted 28 September, 2023; originally announced October 2023.

    Comments: Published at ICLR 2024 (Spotlight), 29 pages, no figures

  2. arXiv:2209.05953  [pdf, ps, other

    stat.ML cs.LG

    Sample Complexity Bounds for Learning High-dimensional Simplices in Noisy Regimes

    Authors: Amir Hossein Saberi, Amir Najafi, Seyed Abolfazl Motahari, Babak H. Khalaj

    Abstract: In this paper, we find a sample complexity bound for learning a simplex from noisy samples. Assume a dataset of size $n$ is given which includes i.i.d. samples drawn from a uniform distribution over an unknown simplex in $\mathbb{R}^K$, where samples are assumed to be corrupted by a multi-variate additive Gaussian noise of an arbitrary magnitude. We prove the existence of an algorithm that with hi… ▽ More

    Submitted 28 April, 2023; v1 submitted 9 September, 2022; originally announced September 2022.

    Comments: Accepted for ICML 2023; 27 pages

  3. arXiv:2208.03325  [pdf, other

    q-bio.GN cs.AI cs.LG

    Isoform Function Prediction Using a Deep Neural Network

    Authors: Sara Ghazanfari, Ali Rasteh, Seyed Abolfazl Motahari, Mahdieh Soleymani Baghshah

    Abstract: Isoforms are mRNAs produced from the same gene site in the phenomenon called Alternative Splicing. Studies have shown that more than 95% of human multi-exon genes have undergone alternative splicing. Although there are few changes in mRNA sequence, They may have a systematic effect on cell function and regulation. It is widely reported that isoforms of a gene have distinct or even contrasting func… ▽ More

    Submitted 25 April, 2023; v1 submitted 5 August, 2022; originally announced August 2022.

    Comments: It needs a final review from co-authors

  4. arXiv:2111.02802  [pdf, other

    stat.ML cs.LG

    Distributed Sparse Feature Selection in Communication-Restricted Networks

    Authors: Hanie Barghi, Amir Najafi, Seyed Abolfazl Motahari

    Abstract: This paper aims to propose and theoretically analyze a new distributed scheme for sparse linear regression and feature selection. The primary goal is to learn the few causal features of a high-dimensional dataset based on noisy observations from an unknown sparse linear model. However, the presumed training set which includes $n$ data samples in $\mathbb{R}^p$ is already distributed over a large n… ▽ More

    Submitted 2 November, 2021; originally announced November 2021.

    Comments: Submitted to IEEE Transactions on Signal Processing, 14 pages

  5. arXiv:2106.07608  [pdf, other

    eess.IV cs.AI cs.CV cs.LG

    Recursive Refinement Network for Deformable Lung Registration between Exhale and Inhale CT Scans

    Authors: Xinzi He, Jia Guo, Xuzhe Zhang, Hanwen Bi, Sarah Gerard, David Kaczka, Amin Motahari, Eric Hoffman, Joseph Reinhardt, R. Graham Barr, Elsa Angelini, Andrew Laine

    Abstract: Unsupervised learning-based medical image registration approaches have witnessed rapid development in recent years. We propose to revisit a commonly ignored while simple and well-established principle: recursive refinement of deformation vector fields across scales. We introduce a recursive refinement network (RRN) for unsupervised medical image registration, to extract multi-scale features, const… ▽ More

    Submitted 14 June, 2021; originally announced June 2021.

  6. arXiv:2012.07527  [pdf, other

    cs.CL cs.LG stat.ML

    Regularizing Recurrent Neural Networks via Sequence Mixup

    Authors: Armin Karamzade, Amir Najafi, Seyed Abolfazl Motahari

    Abstract: In this paper, we extend a class of celebrated regularization techniques originally proposed for feed-forward neural networks, namely Input Mixup (Zhang et al., 2017) and Manifold Mixup (Verma et al., 2018), to the realm of Recurrent Neural Networks (RNN). Our proposed methods are easy to implement and have a low computational complexity, while leverage the performance of simple neural architectur… ▽ More

    Submitted 27 November, 2020; originally announced December 2020.

    Comments: 17 pages

  7. arXiv:1904.00800  [pdf, ps, other

    cs.IT

    Private Shotgun DNA Sequencing: A Structured Approach

    Authors: Ali Gholami, Mohammad Ali Maddah-Ali, Seyed Abolfazl Motahari

    Abstract: DNA sequencing has faced a huge demand since it was first introduced as a service to the public. This service is often offloaded to the sequencing companies who will have access to full knowledge of individuals' sequences, a major violation of privacy. To address this challenge, we propose a solution, which is based on separating the process of reading the fragments of sequences, which is done at… ▽ More

    Submitted 2 April, 2019; v1 submitted 28 March, 2019; originally announced April 2019.

    Comments: 10 pages, 3 figures. arXiv admin note: text overlap with arXiv:1811.10693

    ACM Class: E.4; H.1.1

  8. arXiv:1812.10437  [pdf, other

    cs.LG cs.DC cs.IT stat.ML

    Structure Learning of Sparse GGMs over Multiple Access Networks

    Authors: Mostafa Tavassolipour, Armin Karamzade, Reza Mirzaeifard, Seyed Abolfazl Motahari, Mohammad-Taghi Manzuri Shalmani

    Abstract: A central machine is interested in estimating the underlying structure of a sparse Gaussian Graphical Model (GGM) from datasets distributed across multiple local machines. The local machines can communicate with the central machine through a wireless multiple access channel. In this paper, we are interested in designing effective strategies where reliable learning is feasible under power and bandw… ▽ More

    Submitted 26 December, 2018; originally announced December 2018.

  9. arXiv:1812.07372  [pdf, other

    cs.IT

    Cache-Aided Combination Networks with Interference

    Authors: Ahmed Roushdy, Abolfazl Seyed Motahari, Mohammed Nafie, Deniz Gunduz

    Abstract: Centralized coded caching and delivery is studied for a radio access combination network (RACN), whereby a set of $H$ edge nodes (ENs), connected to a cloud server via orthogonal fronthaul links with limited capacity, serve a total of $K$ user equipments (UEs) over wireless links. Each user, equipped with a cache of size $μ_R N F$ bits, is connected to a distinct set of $r$ ENs each of which equip… ▽ More

    Submitted 28 September, 2019; v1 submitted 15 December, 2018; originally announced December 2018.

    Comments: Submitted for Publication. arXiv admin note: substantial text overlap with arXiv:1802.09087

  10. arXiv:1811.07307  [pdf, ps, other

    math.ST cs.IT

    Information Theoretic Bounds on Optimal Worst-case Error in Binary Mixture Identification

    Authors: Khashayar Gatmiry, Seyed Abolfazl Motahari

    Abstract: Identification of latent binary sequences from a pool of noisy observations has a wide range of applications in both statistical learning and population genetics. Each observed sequence is the result of passing one of the latent mother-sequences through a binary symmetric channel, which makes this configuration analogous to a special case of Bernoulli Mixture Models. This paper aims to attain an a… ▽ More

    Submitted 27 November, 2018; v1 submitted 18 November, 2018; originally announced November 2018.

  11. arXiv:1810.07845  [pdf, other

    cs.LG stat.ML

    On Statistical Learning of Simplices: Unmixing Problem Revisited

    Authors: Amir Najafi, Saeed Ilchi, Amir H. Saberi, Seyed Abolfazl Motahari, Babak H. Khalaj, Hamid R. Rabiee

    Abstract: We study the sample complexity of learning a high-dimensional simplex from a set of points uniformly sampled from its interior. Learning of simplices is a long studied problem in computer science and has applications in computational biology and remote sensing, mostly under the name of `spectral unmixing'. We theoretically show that a sufficient sample complexity for reliable learning of a $K$-dim… ▽ More

    Submitted 12 August, 2020; v1 submitted 17 October, 2018; originally announced October 2018.

    Comments: 32 pages

  12. Learning of Tree-Structured Gaussian Graphical Models on Distributed Data under Communication Constraints

    Authors: Mostafa Tavassolipour, Seyed Abolfazl Motahari, Mohammad-Taghi Manzuri Shalmani

    Abstract: In this paper, learning of tree-structured Gaussian graphical models from distributed data is addressed. In our model, samples are stored in a set of distributed machines where each machine has access to only a subset of features. A central machine is then responsible for learning the structure based on received messages from the other nodes. We present a set of communication efficient strategies,… ▽ More

    Submitted 21 September, 2018; originally announced September 2018.

  13. arXiv:1808.03708  [pdf, other

    cs.IT q-bio.GN

    The Capacity of Associated Subsequence Retrieval

    Authors: Behrooz Tahmasebi, Mohammad Ali Maddah-Ali, Seyed Abolfazl Motahari

    Abstract: The objective of a genome-wide association study (GWAS) is to associate subsequences of individuals' genomes to the observable characteristics called phenotypes (e.g., high blood pressure). Motivated by the GWAS problem, in this paper we introduce the information-theoretic problem of \emph{associated subsequence retrieval}, where a dataset of $N$ (possibly high-dimensional) sequences of length… ▽ More

    Submitted 14 October, 2020; v1 submitted 10 August, 2018; originally announced August 2018.

  14. arXiv:1806.04863  [pdf, other

    q-bio.GN cs.LG stat.ML

    Cell Identity Codes: Understanding Cell Identity from Gene Expression Profiles using Deep Neural Networks

    Authors: Farzad Abdolhosseini, Behrooz Azarkhalili, Abbas Maazallahi, Aryan Kamal, Seyed Abolfazl Motahari, Ali Sharifi-Zarchi, Hamidreza Chitsaz

    Abstract: Understanding cell identity is an important task in many biomedical areas. Expression patterns of specific marker genes have been used to characterize some limited cell types, but exclusive markers are not available for many cell types. A second approach is to use machine learning to discriminate cell types based on the whole gene expression profiles (GEPs). The accuracies of simple classification… ▽ More

    Submitted 13 June, 2018; originally announced June 2018.

  15. arXiv:1802.09087  [pdf, other

    cs.IT

    Cache-Aided Fog Radio Access Networks with Partial Connectivity

    Authors: Ahmed Roushdy, Abolfazl Seyed Motahari, Mohammed Nafie, Deniz Gunduz

    Abstract: Centralized coded caching and delivery is studied for a partially-connected fog radio access network (F-RAN), whereby a set of H edge nodes (ENs) (without caches), connected to a cloud server via orthogonal fronthaul links, serve K users over the wireless edge. The cloud server is assumed to hold a library of N files, each of size F bits; and each user, equipped with a cache of size MF bits, is co… ▽ More

    Submitted 25 February, 2018; originally announced February 2018.

    Comments: To appear at the 2018 IEEE Wireless Communications and Networking Conference (WCNC)

  16. arXiv:1710.02101  [pdf, ps, other

    cs.LG cs.IT stat.ML

    Reliable Clustering of Bernoulli Mixture Models

    Authors: Amir Najafi, Abolfazl Motahari, Hamid R. Rabiee

    Abstract: A Bernoulli Mixture Model (BMM) is a finite mixture of random binary vectors with independent dimensions. The problem of clustering BMM data arises in a variety of real-world applications, ranging from population genetics to activity analysis in social networks. In this paper, we analyze the clusterability of BMMs from a theoretical perspective, when the number of clusters is unknown. In particula… ▽ More

    Submitted 16 June, 2019; v1 submitted 5 October, 2017; originally announced October 2017.

    Comments: 22 pages

  17. arXiv:1705.02627  [pdf, other

    stat.ML cs.IT cs.LG

    Learning of Gaussian Processes in Distributed and Communication Limited Systems

    Authors: Mostafa Tavassolipour, Seyed Abolfazl Motahari, Mohammad-Taghi Manzuri Shalmani

    Abstract: It is of fundamental importance to find algorithms obtaining optimal performance for learning of statistical models in distributed and communication limited systems. Aiming at characterizing the optimal strategies, we consider learning of Gaussian Processes (GPs) in distributed systems as a pivotal example. We first address a very basic problem: how many bits are required to estimate the inner-pro… ▽ More

    Submitted 7 May, 2017; originally announced May 2017.

  18. arXiv:1604.04735  [pdf, other

    cs.IT

    Fundamental Limits of Pooled-DNA Sequencing

    Authors: Amir Najafi, Damoun Nashta-ali, Seyed Abolfazl Motahari, Mehrdad Khani, Babak H. Khalaj, Hamid R. Rabiee

    Abstract: In this paper, fundamental limits in sequencing of a set of closely related DNA molecules are addressed. This problem is called pooled-DNA sequencing which encompasses many interesting problems such as haplotype phasing, metageomics, and conventional pooled-DNA sequencing in the absence of tagging. From an information theoretic point of view, we have proposed fundamental limits on the number and l… ▽ More

    Submitted 19 April, 2016; v1 submitted 16 April, 2016; originally announced April 2016.

    Comments: 39 pages, Submitted to IEEE Transactions on Information Theory

  19. arXiv:1503.00265  [pdf, ps, other

    cs.IT

    Multi-Server Coded Caching

    Authors: Seyed Pooya Shariatpanahi, Seyed Abolfazl Motahari, Babak Hossein Khalaj

    Abstract: In this paper, we consider multiple cache-enabled clients connected to multiple servers through an intermediate network. We design several topology-aware coding strategies for such networks. Based on topology richness of the intermediate network, and types of coding operations at internal nodes, we define three classes of networks, namely, dedicated, flexible, and linear networks. For each class,… ▽ More

    Submitted 1 March, 2015; originally announced March 2015.

  20. arXiv:1412.7188  [pdf, ps, other

    cs.IT math.NT

    Layered Interference Alignment: Achieving the Total DoF of MIMO X Channels

    Authors: Seyyed Hassan Mahboubi, Mumtaz Hussain, Abolfazl Seyed Motahari, Amir Keyvan Khandani

    Abstract: The $K\times 2$ and $2\times K$, Multiple-Input Multiple-Output (MIMO) X channel with constant channel coefficients available at all transmitters and receivers is considered. A new alignment scheme, named \emph{layered interference alignment}, is proposed in which both vector and real interference alignment are exploited, in conjunction with joint processing at receiver sides. Data streams with fr… ▽ More

    Submitted 22 December, 2014; originally announced December 2014.

    Comments: 26 pages, 4 figures. Preliminary version. Any comments and suggestions for improvement are most welcome

  21. arXiv:1304.2798  [pdf, ps, other

    cs.IT q-bio.GN

    Optimal DNA shotgun sequencing: Noisy reads are as good as noiseless reads

    Authors: Abolfazl Motahari, Kannan Ramchandran, David Tse, Nan Ma

    Abstract: We establish the fundamental limits of DNA shotgun sequencing under noisy reads. We show a surprising result: for the i.i.d. DNA model, noisy reads are as good as noiseless reads, provided that the noise level is below a certain threshold which can be surprisingly high. As an example, for a uniformly distributed DNA sequence and a symmetric substitution noisy read channel, the threshold is as high… ▽ More

    Submitted 9 April, 2013; originally announced April 2013.

    Comments: Submitted to ISIT 2013

  22. arXiv:1203.6233  [pdf, ps, other

    cs.IT q-bio.GN q-bio.QM

    Information Theory of DNA Shotgun Sequencing

    Authors: Abolfazl Motahari, Guy Bresler, David Tse

    Abstract: DNA sequencing is the basic workhorse of modern day biology and medicine. Shotgun sequencing is the dominant technique used: many randomly located short fragments called reads are extracted from the DNA sequence, and these reads are assembled to reconstruct the original sequence. A basic question is: given a sequencing technology and the statistics of the DNA sequence, what is the minimum number o… ▽ More

    Submitted 14 February, 2013; v1 submitted 28 March, 2012; originally announced March 2012.

    Comments: Revised Version

  23. arXiv:1102.5673  [pdf, other

    cs.IT

    Interference Alignment for the MIMO Interference Channel with Delayed Local CSIT

    Authors: Akbar Ghasemi, Abolfazl Seyed Motahari, Amir Keyvan Khandani

    Abstract: We consider the MIMO (multiple-input multiple-output) Gaussian interference channel with i.i.d. fading across antennas and channel uses and with the delayed local channel state information at the transmitters (CSIT). For the two-user case, achievability results for the degrees of freedom (DoF) region of this channel are provided. We also prove the tightness of our achievable DoF region for some an… ▽ More

    Submitted 28 February, 2011; originally announced February 2011.

    Comments: 36 pages, 5 figures

  24. arXiv:1005.1635  [pdf, ps, other

    cs.IT

    The Approximate Capacity Region of the Gaussian Z-Interference Channel with Conferencing Encoders

    Authors: Hossein Bagheri, Abolfazl S. Motahari, Amir K. Khandani

    Abstract: A two-user Gaussian Z-Interference Channel (GZIC) is considered, in which encoders are connected through noiseless links with finite capacities. In this setting, prior to each transmission block the encoders communicate with each other over the cooperative links. The capacity region and the sum-capacity of the channel are characterized within 1.71 bits per user and 2 bits in total, respectively. I… ▽ More

    Submitted 26 May, 2010; v1 submitted 10 May, 2010; originally announced May 2010.

    Comments: 25 pages, 6 figures, submitted to IEEE Transactions on Information Theory

  25. arXiv:1003.0729  [pdf, ps, other

    cs.IT

    On the Secure Degrees-of-Freedom of the Multiple-Access-Channel

    Authors: Ghadamali Bagherikaram, Abolfazl S. Motahari, Amir K. Khandani

    Abstract: A $K$-user secure Gaussian Multiple-Access-Channel (MAC) with an external eavesdropper is considered in this paper. An achievable rate region is established for the secure discrete memoryless MAC. The secrecy sum capacity of the degraded Gaussian MIMO MAC is proven using Gaussian codebooks. For the non-degraded Gaussian MIMO MAC, an algorithm inspired by interference alignment technique is propo… ▽ More

    Submitted 3 March, 2010; originally announced March 2010.

    Comments: The conference version of this work has been submitted to ISIT 2010

  26. arXiv:1001.3403  [pdf, ps, other

    cs.IT math.NT

    Real Interference Alignment

    Authors: Abolfazl Seyed Motahari, Shahab Oveis-Gharan, Mohammad-Ali Maddah-Ali, Amir Keyvan Khandani

    Abstract: In this paper, we show that the total Degrees-Of-Freedoms (DOF) of the $K$-user Gaussian Interference Channel (GIC) can be achieved by incorporating a new alignment technique known as \emph{real interference alignment}. This technique compared to its ancestor \emph{vector interference alignment} performs on a single real line and exploits the properties of real numbers to provide optimal signali… ▽ More

    Submitted 19 January, 2010; originally announced January 2010.

    Comments: Submitted to ISIT 2010. For the full version, please visit arXiv:0908.2282

  27. arXiv:1001.1768  [pdf, ps, other

    cs.IT

    On the Secure DoF of the Single-Antenna MAC

    Authors: Ghadamali Bagherikaram, Abolfazl S. Motahari, Amir K. Khandani

    Abstract: A new achievability rate region for the secure discrete memoryless Multiple-Access-Channel (MAC) is presented. Thereafter, a novel secure coding scheme is proposed to achieve a positive Secure Degrees-of-Freedom (S-DoF) in the single-antenna MAC. This scheme converts the single-antenna system into a multiple-dimension system with fractional dimensions. The achievability scheme is based on the al… ▽ More

    Submitted 13 January, 2010; v1 submitted 11 January, 2010; originally announced January 2010.

    Comments: 5 Pages, Submitted to ISIT 2010

  28. On the Capacity of the Half-Duplex Diamond Channel

    Authors: Hossein Bagheri, Abolfazl S. Motahari, Amir K. Khandani

    Abstract: In this paper, a dual-hop communication system composed of a source S and a destination D connected through two non-interfering half-duplex relays, R1 and R2, is considered. In the literature of Information Theory, this configuration is known as the diamond channel. In this setup, four transmission modes are present, namely: 1) S transmits, and R1 and R2 listen (broadcast mode), 2) S transmits,… ▽ More

    Submitted 9 November, 2009; originally announced November 2009.

    Comments: 25 pages, 2 figures, submitted to IEEE Transactions on Information Theory

  29. arXiv:0910.3658  [pdf, ps, other

    cs.IT

    Secrecy Rate Region of the Broadcast Channel with an Eavesdropper

    Authors: Ghadamali Bagherikaram, Abolfazl S. Motahari, Amir K. Khandani

    Abstract: In this paper, we consider a scenario where a source node wishes to broadcast two confidential messages to two receivers, while a wire-tapper also receives the transmitted signal. This model is motivated by wireless communications, where individual secure messages are broadcast over open media and can be received by any illegitimate receiver. The secrecy level is measured by the equivocation rat… ▽ More

    Submitted 19 October, 2009; originally announced October 2009.

    Comments: 18 Pages, Submitted to IEEE Transaction on Information Theory (Revised Version)

  30. Interference Alignment for the $K$ User MIMO Interference Channel

    Authors: Akbar Ghasemi, Abolfazl Seyed Motahari, Amir Keyvan Khandani

    Abstract: We consider the $K$-user Multiple Input Multiple Output (MIMO) Gaussian interference channel with $M$ antennas at each transmitter and $N$ antennas at each receiver. It is assumed that channel coefficients are constant and are available at all transmitters and at all receivers. The main objective of this paper is to characterize the Degrees of Freedom (DoF) for this channel. Using a new interferen… ▽ More

    Submitted 21 September, 2011; v1 submitted 25 September, 2009; originally announced September 2009.

    Comments: 25 pages, 4 figures, Presented in part at ISIT 2010, submitted to IEEE Transactions on Information Theory, June 2011

  31. arXiv:0909.2777  [pdf, ps, other

    cs.IT

    On the Symmetric Gaussian Interference Channel with Partial Unidirectional Cooperation

    Authors: Hossein Bagheri, Abolfazl S. Motahari, Amir K. Khandani

    Abstract: A two-user symmetric Gaussian Interference Channel (IC) is considered in which a noiseless unidirectional link connects one encoder to the other. Having a constant capacity, the additional link provides partial cooperation between the encoders. It is shown that the available cooperation can dramatically increase the sum-capacity of the channel. This fact is proved based on comparison of proposed… ▽ More

    Submitted 15 September, 2009; originally announced September 2009.

  32. Real Interference Alignment: Exploiting the Potential of Single Antenna Systems

    Authors: Abolfazl Seyed Motahari, Shahab Oveis Gharan, Mohammad-Ali Maddah-Ali, Amir Keyvan Khandani

    Abstract: In this paper, the available spatial Degrees-Of-Freedoms (DOF) in single antenna systems is exploited. A new coding scheme is proposed in which several data streams having fractional multiplexing gains are sent by transmitters and interfering streams are aligned at receivers. Viewed as a field over rational numbers, a received signal has infinite fractional DOFs, allowing simultaneous interferen… ▽ More

    Submitted 23 November, 2009; v1 submitted 17 August, 2009; originally announced August 2009.

    Comments: Submitted to IEEE Transaction on Information Theory. The first version was uploaded on arxiv on 17 Aug 2009 with the following title: Forming Pseudo-MIMO by Embedding Infinite Rational Dimensions Along a Single Real Line: Removing Barriers in Achieving the DOFs of Single Antenna Systems

  33. arXiv:0908.1208  [pdf, ps, other

    cs.IT

    Real Interference Alignment with Real Numbers

    Authors: Abolfazl S. Motahari, Shahab Oveis Gharan, Amir K. Khandani

    Abstract: A novel coding scheme applicable in networks with single antenna nodes is proposed. This scheme converts a single antenna system to an equivalent Multiple Input Multiple Output (MIMO) system with fractional dimensions. Interference can be aligned along these dimensions and higher Multiplexing gains can be achieved. Tools from the field of Diophantine approximation in number theory are used to sh… ▽ More

    Submitted 12 August, 2009; v1 submitted 9 August, 2009; originally announced August 2009.

    Comments: Submitted to IEEE Trans. on Information Theory

  34. arXiv:0904.4735  [pdf, ps, other

    cs.IT

    The Secrecy Capacity Region of the Degraded Vector Gaussian Broadcast Channel

    Authors: Ghadamali Bagherikaram, Abolfazl S. Motahari, Amir K. Khandani

    Abstract: In this paper, we consider a scenario where a source node wishes to broadcast two confidential messages for two respective receivers via a Gaussian MIMO broadcast channel. A wire-tapper also receives the transmitted signal via another MIMO channel. It is assumed that the channels are degraded and the wire-tapper has the worst channel. We establish the capacity region of this scenario. Our achiev… ▽ More

    Submitted 29 April, 2009; originally announced April 2009.

    Comments: 5 Pages, 1 Figure, To be Presented at the ISIT 2009

  35. arXiv:0903.3261  [pdf, ps, other

    cs.IT

    The Secrecy Capacity Region of the Gaussian MIMO Broadcast Channel

    Authors: Ghadamali Bagherikaram, Abolfazl S. Motahari, Amir K. Khandani

    Abstract: In this paper, we consider a scenario where a source node wishes to broadcast two confidential messages for two respective receivers via a Gaussian MIMO broadcast channel. A wire-tapper also receives the transmitted signal via another MIMO channel. First we assumed that the channels are degraded and the wire-tapper has the worst channel. We establish the capacity region of this scenario. Our ach… ▽ More

    Submitted 19 October, 2009; v1 submitted 18 March, 2009; originally announced March 2009.

    Comments: 23 pages, 2 figures

  36. arXiv:0806.4200  [pdf, ps, other

    cs.IT

    The Secrecy Rate Region of the Broadcast Channel

    Authors: Ghadamali Bagherikaram, Abolfazl S. Motahari, Amir K. Khandani

    Abstract: In this paper, we consider a scenario where a source node wishes to broadcast two confidential messages for two respective receivers, while a wire-tapper also receives the transmitted signal. This model is motivated by wireless communications, where individual secure messages are broadcast over open media and can be received by any illegitimate receiver. The secrecy level is measured by equivoca… ▽ More

    Submitted 30 July, 2008; v1 submitted 25 June, 2008; originally announced June 2008.

    Comments: 12 pages, 4 figures

  37. arXiv:0805.2641  [pdf, ps, other

    cs.IT

    On the Capacity of the Diamond Half-Duplex Relay Channel

    Authors: Hossein Bagheri, Abolfazl S. Motahari, Amir K. Khandani

    Abstract: We consider a diamond-shaped dual-hop communication system consisting a source, two parallel half-duplex relays and a destination. In a single antenna configuration, it has been previously shown that a two-phase node-scheduling algorithm, along with the decode and forward strategy can achieve the capacity of the diamond channel for a certain symmetric channel gains [1]. In this paper, we obtain… ▽ More

    Submitted 16 May, 2008; originally announced May 2008.

  38. arXiv:0801.1306  [pdf, ps, other

    cs.IT

    Capacity Bounds for the Gaussian Interference Channel

    Authors: Abolfazl S. Motahari, Amir K. Khandani

    Abstract: The capacity region of the two-user Gaussian Interference Channel (IC) is studied. Three classes of channels are considered: weak, one-sided, and mixed Gaussian IC. For the weak Gaussian IC, a new outer bound on the capacity region is obtained that outperforms previously known outer bounds. The sum capacity for a certain range of channel parameters is derived. For this range, it is proved that u… ▽ More

    Submitted 8 January, 2008; originally announced January 2008.

    Comments: 35 pages, 14 figures, submitted to IEEE Trans. on Inf. Theory

  39. arXiv:0711.3176  [pdf, ps, other

    cs.IT

    To Decode the Interference or To Consider it as Noise

    Authors: Abolfazl S. Motahari, Amir K. Khandani

    Abstract: We address single-user data transmission over a channel where the received signal incurs interference from a finite number of users (interfering users) that use single codebooks for transmitting their own messages. The receiver, however, is allowed to decode interfering users' messages. This means the signal transmitted from any interfering user is either decoded or considered as noise at the re… ▽ More

    Submitted 20 November, 2007; originally announced November 2007.

    Comments: submitted to IEEE Transactions on Information Theory