Skip to main content

Showing 1–20 of 20 results for author: Tahmasbi, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2309.16708  [pdf, other

    cs.CV cs.LG

    Automatic Cadastral Boundary Detection of Very High Resolution Images Using Mask R-CNN

    Authors: Neda Rahimpour Anaraki, Alireza Azadbakht, Maryam Tahmasbi, Hadi Farahani, Saeed Reza Kheradpisheh, Alireza Javaheri

    Abstract: Recently, there has been a high demand for accelerating and improving the detection of automatic cadastral map**. As this problem is in its starting point, there are many methods of computer vision and deep learning that have not been considered yet. In this paper, we focus on deep learning and provide three geometric post-processing methods that improve the quality of the work. Our framework in… ▽ More

    Submitted 17 August, 2023; originally announced September 2023.

  2. arXiv:2305.10277  [pdf, ps, other

    quant-ph cs.CC

    Quadratic Lower bounds on the Approximate Stabilizer Rank: A Probabilistic Approach

    Authors: Saeed Mehraban, Mehrdad Tahmasbi

    Abstract: The approximate stabilizer rank of a quantum state is the minimum number of terms in any approximate decomposition of that state into stabilizer states. Bravyi and Gosset showed that the approximate stabilizer rank of a so-called "magic" state like $|T\rangle^{\otimes n}$, up to polynomial factors, is an upper bound on the number of classical operations required to simulate an arbitrary quantum ci… ▽ More

    Submitted 29 March, 2024; v1 submitted 17 May, 2023; originally announced May 2023.

  3. arXiv:2103.14510  [pdf, ps, other

    quant-ph cs.CR

    Limitations on Uncloneable Encryption and Simultaneous One-Way-to-Hiding

    Authors: Christian Majenz, Christian Schaffner, Mehrdad Tahmasbi

    Abstract: We study uncloneable quantum encryption schemes for classical messages as recently proposed by Broadbent and Lord. We focus on the information-theoretic setting and give several limitations on the structure and security of these schemes: Concretely, 1) We give an explicit cloning-indistinguishable attack that succeeds with probability $\frac12 + μ/16$ where $μ$ is related to the largest eigenvalue… ▽ More

    Submitted 4 November, 2021; v1 submitted 26 March, 2021; originally announced March 2021.

    Comments: v2 and v3: several fixes, including a missing attribution to Broadbent and Lord

  4. arXiv:2008.01264  [pdf, other

    cs.IT

    On Covert Quantum Sensing and the Benefits of Entanglement

    Authors: Mehrdad Tahmasbi, Matthieu Bloch

    Abstract: Motivated by applications to covert quantum radar, we analyze a covert quantum sensing problem, in which a legitimate user aims at estimating an unknown parameter taking finitely many values by probing a quantum channel while remaining undetectable from an adversary receiving the probing signals through another quantum channel. When channels are classical-quantum, we characterize the optimal error… ▽ More

    Submitted 3 August, 2020; originally announced August 2020.

  5. arXiv:2003.09314  [pdf, other

    cs.DM

    New heuristics for burning graphs

    Authors: Zahra Rezai Farokh, Maryam Tahmasbi, Zahra Haj Rajab Ali Tehrani, Yousof Buali

    Abstract: The concept of graph burning and burning number ($bn(G)$) of a graph G was introduced recently [1]. Graph burning models the spread of contagion (fire) in a graph in discrete time steps. $bn(G)$ is the minimum time needed to burn a graph $G$.The problem is NP-complete. In this paper, we develop first heuristics to solve the problem in general (connected) graphs. In order to test the performance of… ▽ More

    Submitted 20 March, 2020; originally announced March 2020.

    Comments: 10 pages, 1 figure

  6. arXiv:1909.03534  [pdf, ps, other

    cs.CV

    A New GNG Graph-Based Hand Gesture Recognition Approach

    Authors: Narges Mirehi, Maryam Tahmasbi

    Abstract: Hand Gesture Recognition (HGR) is of major importance for Human-Computer Interaction (HCI) applications. In this paper, we present a new hand gesture recognition approach called GNG-IEMD. In this approach, first, we use a Growing Neural Gas (GNG) graph to model the image. Then we extract features from this graph. These features are not geometric or pixel-based, so do not depend on scale, rotation,… ▽ More

    Submitted 8 September, 2019; originally announced September 2019.

  7. arXiv:1909.03482  [pdf, ps, other

    cs.CV

    New Graph-based Features For Shape Recognition

    Authors: Narges Mirehi, Maryam Tahmasbi, Alireza Tavakoli Targhi

    Abstract: Shape recognition is the main challenging problem in computer vision. Different approaches and tools are used to solve this problem. Most existing approaches to object recognition are based on pixels. Pixel-based methods are dependent on the geometry and nature of the pixels, so the destruction of pixels reduces their performance. In this paper, we study the ability of graphs as shape recognition.… ▽ More

    Submitted 8 September, 2019; originally announced September 2019.

  8. arXiv:1907.09602  [pdf, other

    cs.IT quant-ph

    Steganography Protocols for Quantum Channels

    Authors: Mehrdad Tahmasbi, Matthieu Bloch

    Abstract: We study several versions of a quantum steganography problem, in which two legitimate parties attempt to conceal a cypher in a quantum cover transmitted over a quantum channel without arising suspicion from a warden who intercepts the cover. In all our models, we assume that the warden has an inaccurate knowledge of the quantum channel and we formulate several variations of the steganography probl… ▽ More

    Submitted 22 July, 2019; originally announced July 2019.

  9. arXiv:1904.12363  [pdf, other

    cs.IT cs.CR quant-ph

    Toward Undetectable Quantum Key Distribution over Bosonic Channels

    Authors: Mehrdad Tahmasbi, Matthieu R. Bloch

    Abstract: We show that covert secret key expansion is possible using a public authenticated classical channel and a quantum channel largely under control of an adversary, which we precisely define. We also prove a converse result showing that, under the golden standard of quantum key distribution by which the adversary completely controls the quantum channel, no covert key generation is possible. We propose… ▽ More

    Submitted 8 November, 2019; v1 submitted 28 April, 2019; originally announced April 2019.

  10. Covert Secret Key Generation with an Active Warden

    Authors: Mehrdad Tahmasbi, Matthieu Bloch

    Abstract: We investigate the problem of covert and secret key generation over a state-dependent discrete memoryless channel with one-way public discussion in which an adversary, the warden, may arbitrarily choose the channel state. We develop an adaptive protocol that, under conditions that we explicitly specify, not only allows the transmitter and the legitimate receiver to exchange a secret key but also c… ▽ More

    Submitted 8 November, 2019; v1 submitted 7 January, 2019; originally announced January 2019.

    Journal ref: in IEEE Transactions on Information Forensics and Security, vol. 15, pp. 1026-1039, 2020

  11. arXiv:1812.07857  [pdf, other

    cs.CV

    Physical Attribute Prediction Using Deep Residual Neural Networks

    Authors: Rashidedin Jahandideh, Alireza Tavakoli Targhi, Maryam Tahmasbi

    Abstract: Images taken from the Internet have been used alongside Deep Learning for many different tasks such as: smile detection, ethnicity, hair style, hair colour, gender and age prediction. After witnessing these usages, we were wondering what other attributes can be predicted from facial images available on the Internet. In this paper we tackle the prediction of physical attributes from face images usi… ▽ More

    Submitted 19 December, 2018; originally announced December 2018.

  12. arXiv:1811.09695  [pdf, other

    cs.IT

    Multilevel-Coded Pulse-Position Modulation for Covert Communications over Binary-Input Discrete Memoryless Channels

    Authors: Ishaque Ashar Kadampot, Mehrdad Tahmasbi, Matthieu R Bloch

    Abstract: We develop a low-complexity coding scheme to achieve covert communications over binary-input discrete memoryless channels (BI-DMCs). We circumvent the impossibility of covert communication with linear codes by introducing non-linearity through the use of pulse position modulation (PPM) and multilevel coding (MLC). We show that the MLC-PPM scheme exhibits many appealing properties; in particular, t… ▽ More

    Submitted 23 November, 2018; originally announced November 2018.

  13. A framework for covert and secret key expansion over quantum channels

    Authors: Mehrdad Tahmasbi, Matthieu R. Bloch

    Abstract: Covert and secret quantum key distribution aims at generating information-theoretically secret bits between distant legitimate parties in a manner that remains provably undetectable by an adversary. We propose a framework in which to precisely define and analyze such an operation, and we show that covert and secret key expansion is possible. For fixed and known classical-quantum channels, we devel… ▽ More

    Submitted 24 November, 2018; v1 submitted 13 November, 2018; originally announced November 2018.

    Journal ref: Phys. Rev. A 99, 052329 (2019)

  14. arXiv:1810.07687  [pdf, other

    cs.IT

    Covert Capacity of Non-Coherent Rayleigh-Fading Channels

    Authors: Mehrdad Tahmasbi, Anne Savard, Matthieu R. Bloch

    Abstract: The covert capacity is characterized for a non-coherent fast Rayleigh-fading wireless channel, in which a legitimate user wishes to communicate reliably with a legitimate receiver while esca** detection from a warden. It is shown that the covert capacity is achieved with an amplitude-constrained input distribution that consists of a finite number of mass points including one at zero and numerica… ▽ More

    Submitted 8 November, 2019; v1 submitted 17 October, 2018; originally announced October 2018.

  15. Learning an Adversary's Actions for Secret Communication

    Authors: Mehrdad Tahmasbi, Matthieu R. Bloch, Aylin Yener

    Abstract: Secure communication over a wiretap channel is investigated, in which an active adversary modifies the state of the channel and the legitimate transmitter has the opportunity to sense and learn the adversary's actions. The adversary has the ability to switch the channel state and observe the corresponding output at every channel use while the encoder has causal access to observations that depend o… ▽ More

    Submitted 8 November, 2019; v1 submitted 23 July, 2018; originally announced July 2018.

  16. arXiv:1806.05653  [pdf, other

    cs.CV

    HGR-Net: A Fusion Network for Hand Gesture Segmentation and Recognition

    Authors: Amirhossein Dadashzadeh, Alireza Tavakoli Targhi, Maryam Tahmasbi, Majid Mirmehdi

    Abstract: We propose a two-stage convolutional neural network (CNN) architecture for robust recognition of hand gestures, called HGR-Net, where the first stage performs accurate semantic segmentation to determine hand regions, and the second stage identifies the gesture. The segmentation stage architecture is based on the combination of fully convolutional residual network and atrous spatial pyramid pooling… ▽ More

    Submitted 28 December, 2019; v1 submitted 14 June, 2018; originally announced June 2018.

  17. First and Second Order Asymptotics in Covert Communication

    Authors: Mehrdad Tahmasbi, Matthieu R. Bloch

    Abstract: We study the first- and second-order asymptotics of covert communication over binary-input DMC for three different covertness metrics and under maximum probability of error constraint. When covertness is measured in terms of the relative entropy between the channel output distributions induced with and without communication, we characterize the exact first- and second-order asymptotics of the numb… ▽ More

    Submitted 3 July, 2018; v1 submitted 3 March, 2017; originally announced March 2017.

  18. arXiv:1601.06826  [pdf, other

    quant-ph cs.IT

    Covert Communication over Classical-Quantum Channels

    Authors: Michael S. Bullock, Azadeh Sheikholeslami, Mehrdad Tahmasbi, Robert C. Macdonald, Saikat Guha, Boulat A. Bash

    Abstract: We investigate covert communication over general memoryless classical-quantum channels with fixed finite-size input alphabets. We show that the square root law (SRL) governs covert communication in this setting when product of $n$ input states is used: $L_{\rm SRL}\sqrt{n}+o(\sqrt{n})$ covert bits (but no more) can be reliably transmitted in $n$ uses of classical-quantum channel, where… ▽ More

    Submitted 21 July, 2023; v1 submitted 25 January, 2016; originally announced January 2016.

    Comments: Corrected typos, 52 pages, 2 figures

  19. arXiv:1511.02307  [pdf, other

    cs.IT

    On the Capacity Achieving Probability Measures for Molecular Receivers

    Authors: Mehrdad Tahmasbi, Faramarz Fekri

    Abstract: In this paper, diffusion-based molecular commu- nication with ligand receptor receivers is studied. Information messages are assumed to be encoded via variations of the con- centration of molecules. The randomness in the ligand reception process induces uncertainty in the communication; limiting the rate of information decoding. We model the ligand receptor receiver by a set of finite-state Markov… ▽ More

    Submitted 7 November, 2015; originally announced November 2015.

    Comments: 6 pages, 1 figure

  20. arXiv:1312.0132  [pdf, ps, other

    cs.IT cs.DM

    Critical Graphs in Index Coding

    Authors: Mehrdad Tahmasbi, Amirbehshad Shahrasbi, Amin Gohari

    Abstract: In this paper we define critical graphs as minimal graphs that support a given set of rates for the index coding problem, and study them for both the one-shot and asymptotic setups. For the case of equal rates, we find the critical graph with minimum number of edges for both one-shot and asymptotic cases. For the general case of possibly distinct rates, we show that for one-shot and asymptotic lin… ▽ More

    Submitted 12 April, 2014; v1 submitted 30 November, 2013; originally announced December 2013.