Skip to main content

Showing 1–15 of 15 results for author: Sarkiss, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.13466  [pdf, other

    cs.IT

    Unveiling Covert Semantics: Joint Source-Channel Coding Under a Covertness Constraint

    Authors: Abdelaziz Bounhar, Mireille Sarkiss, Michèle Wigger

    Abstract: The fundamental limit of Semantic Communications (joint source-channel coding) is established when the transmission needs to be kept covert from an external warden. We derive information-theoretic achievability and matching converse results and we show that source and channel coding separation holds for this setup. Furthermore, we show through an experimental setup that one can train a deep neural… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

    Comments: Submitted to GLOBECOM'2024 for review

  2. arXiv:2404.14056  [pdf, other

    cs.IT

    Covert Multi-Access Communication with a Non-Covert User

    Authors: Abdelaziz Bounhar, Mireille Sarkiss, Michèle Wigger

    Abstract: In this paper, we characterize the fundamental limits of a communication system with three users (i.e., three transmitters) and a single receiver where communication from two covert users must remain undetectable to an external warden. Our results show a tradeoff between the highest rates that are simultaneously achievable for the three users. They further show that the presence of a non-covert us… ▽ More

    Submitted 22 April, 2024; originally announced April 2024.

    Comments: To be presented at ICC2024

  3. Efficient Network Representation for GNN-based Intrusion Detection

    Authors: Hamdi Friji, Alexis Olivereau, Mireille Sarkiss

    Abstract: The last decades have seen a growth in the number of cyber-attacks with severe economic and privacy damages, which reveals the need for network intrusion detection approaches to assist in preventing cyber-attacks and reducing their risks. In this work, we propose a novel network representation as a graph of flows that aims to provide relevant topological information for the intrusion detection tas… ▽ More

    Submitted 11 September, 2023; originally announced October 2023.

    Journal ref: Tibouchi, M., Wang, X. (eds) Applied Cryptography and Network Security. ACNS 2023. Lecture Notes in Computer Science, vol 13905. Springer, Cham

  4. arXiv:2305.06268  [pdf, other

    cs.IT

    Mixing a Covert and a Non-Covert User

    Authors: Abdelaziz Bounhar, Mireille Sarkiss, Michèle Wigger

    Abstract: This paper establishes the fundamental limits of a two-user single-receiver system where communication from User 1 (but not from User 2) needs to be undetectable to an external warden. Our fundamental limits show a tradeoff between the highest rates (or square-root rates) that are simultaneously achievable for the two users. Moreover, coded time-sharing for both users is fundamentally required on… ▽ More

    Submitted 11 May, 2023; v1 submitted 10 May, 2023; originally announced May 2023.

    Comments: Accepted to 2023 IEEE International Symposium on Information Theory (ISIT)

  5. arXiv:2301.06289  [pdf, other

    cs.IT

    Strong Converses using Typical Changes of Measures and Asymptotic Markov Chains

    Authors: Mustapha Hamad, Michele Wigger, Mireille Sarkiss

    Abstract: The paper presents exponentially-strong converses for source-coding, channel coding, and hypothesis testing problems. More specifically, it presents alternative proofs for the well-known exponentially-strong converse bounds for almost lossless source-coding with side-information and for channel coding over a discrete memoryless channel (DMC). These alternative proofs are solely based on a change o… ▽ More

    Submitted 16 January, 2023; originally announced January 2023.

    Comments: Submitted to IEEE Trans. on IT

  6. arXiv:2211.03475  [pdf, ps, other

    cs.IT

    Testing Against Independence with an Eavesdropper

    Authors: Sara Faour, Mustapha Hamad, Mireille Sarkiss, Michele Wigger

    Abstract: We study a distributed binary hypothesis testing (HT) problem with communication and security constraints, involving three parties: a remote sensor called Alice, a legitimate decision centre called Bob, and an eavesdropper called Eve, all having their own source observations. In this system, Alice conveys a rate R description of her observation to Bob, and Bob performs a binary hypothesis test on… ▽ More

    Submitted 7 November, 2022; originally announced November 2022.

    Comments: submitted to ITW 2023

  7. arXiv:2208.14243  [pdf, other

    cs.IT

    Multi-Hop Network with Multiple Decision Centers under Expected-Rate Constraints

    Authors: Mustapha Hamad, Michèle Wigger, Mireille Sarkiss

    Abstract: We consider a multi-hop distributed hypothesis testing problem with multiple decision centers (DCs) for testing against independence and where the observations obey some Markov chain. For this system, we characterize the fundamental type-II error exponents region, i.e., the type-II error exponents that the various DCs can achieve simultaneously, under expected rate-constraints. Our results show th… ▽ More

    Submitted 30 August, 2022; originally announced August 2022.

    Comments: Submitted to IEEE Transactions on Information Theory

  8. arXiv:2205.08910  [pdf, other

    cs.IT

    Strong Converses using Change of Measure and Asymptotic Markov Chains

    Authors: Mustapha Hamad, Michèle Wigger, Mireille Sarkiss

    Abstract: The main contribution of this paper is a strong converse result for $K$-hop distributed hypothesis testing against independence with multiple (intermediate) decision centers under a Markov condition. Our result shows that the set of type-II error exponents that can simultaneously be achieved at all the terminals does not depend on the maximum permissible type-I error probabilities. Our strong conv… ▽ More

    Submitted 18 May, 2022; originally announced May 2022.

  9. arXiv:2202.02282  [pdf, other

    cs.IT

    Benefits of Rate-Sharing for Distributed Hypothesis Testing

    Authors: Mustapha Hamad, Mireille Sarkiss, Michèle Wigger

    Abstract: We study distributed binary hypothesis testing with a single sensor and two remote decision centers that are also equipped with local sensors. The communication between the sensor and the two decision centers takes place over three links: a shared link to both centers and an individual link to each of the two centers. All communication links are subject to expected rate constraints. This paper cha… ▽ More

    Submitted 4 February, 2022; originally announced February 2022.

    Comments: arXiv admin note: text overlap with arXiv:2106.12299

  10. arXiv:2106.12299  [pdf, other

    cs.IT

    Optimal Exponents In Cascaded Hypothesis Testing under Expected Rate Constraints

    Authors: Mustapha Hamad, Michèle Wigger, Mireille Sarkiss

    Abstract: Cascaded binary hypothesis testing is studied in this paper with two decision centers at the relay and the receiver. All terminals have their own observations, where we assume that the observations at the transmitter, the relay, and the receiver form a Markov chain in this order. The communication occurs over two hops, from the transmitter to the relay and from the relay to the receiver. Expected… ▽ More

    Submitted 23 June, 2021; originally announced June 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:2105.05917

  11. arXiv:2105.05917  [pdf, other

    cs.IT

    Two-Hop Network with Multiple Decision Centers under Expected-Rate Constraints

    Authors: Mustapha Hamad, Michèle Wigger, Mireille Sarkiss

    Abstract: The paper studies distributed binary hypothesis testing over a two-hop relay network where both the relay and the receiver decide on the hypothesis. Both communication links are subject to expected rate constraints, which differs from the classical assumption of maximum rate constraints. We exactly characterize the set of type-II error exponent pairs at the relay and the receiver when both type-I… ▽ More

    Submitted 26 May, 2021; v1 submitted 12 May, 2021; originally announced May 2021.

  12. arXiv:2010.09616  [pdf, other

    cs.IT

    Cooperative Multi-Sensor Detection under Variable-Length Coding

    Authors: Mustapha Hamad, Michèle Wigger, Mireille Sarkiss

    Abstract: We investigate the testing-against-independence problem \mw{over a cooperative MAC} with two sensors and a single detector under an average rate constraint on the sensors-detector links. For this setup, we design a variable-length coding scheme that maximizes the achievable type-II error exponent when the type-I error probability is limited to $ε$. Similarly to the single-link result, we show here… ▽ More

    Submitted 19 October, 2020; originally announced October 2020.

  13. arXiv:1801.00606  [pdf, ps, other

    cs.IT

    Secrecy Capacity-Memory Tradeoff of Erasure Broadcast Channels

    Authors: Sarah Kamel, Mireille Sarkiss, Michèle Wigger, Ghaya Rekaya-Ben Othman

    Abstract: This paper derives upper and lower bounds on the secrecy capacity-memory tradeoff of a wiretap erasure broadcast channel (BC) with Kw weak receivers and Ks strong receivers, where weak receivers, respectively strong receivers, have same erasure probabilities and cache sizes. The lower bounds are achieved by schemes that meticulously combine joint cache-channel coding with wiretap coding and key-ai… ▽ More

    Submitted 2 January, 2018; originally announced January 2018.

  14. Achievable Rate Regions for Two-Way Relay Channel using Nested Lattice Coding

    Authors: Sinda Smirani, Mohamed Kamoun, Mireille Sarkiss, Abdellatif Zaidi, Pierre Duhamel

    Abstract: This paper studies Gaussian Two-Way Relay Channel where two communication nodes exchange messages with each other via a relay. It is assumed that all nodes operate in half duplex mode without any direct link between the communication nodes. A compress-and-forward relaying strategy using nested lattice codes is first proposed. Then, the proposed scheme is improved by performing a layered coding : a… ▽ More

    Submitted 21 November, 2013; originally announced November 2013.

    Comments: 27 pages, 13 figures, Submitted to IEEE Transactions on Wireless Communications (October 2013)

  15. arXiv:1011.0474  [pdf, ps, other

    cs.IT

    Construction of New Delay-Tolerant Space-Time Codes

    Authors: Mireille Sarkiss, Ghaya Rekaya-Ben Othman, Mohamed Oussama Damen, Jean-Claude Belfiore

    Abstract: Perfect Space-Time Codes (STC) are optimal codes in their original construction for Multiple Input Multiple Output (MIMO) systems. Based on Cyclic Division Algebras (CDA), they are full-rate, full-diversity codes, have Non-Vanishing Determinants (NVD) and hence achieve Diversity-Multiplexing Tradeoff (DMT). In addition, these codes have led to optimal distributed space-time codes when applied in c… ▽ More

    Submitted 1 November, 2010; originally announced November 2010.

    Comments: 33 pages, 7 figures