Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–27 of 27 results for author: Pishro-Nik, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.19143  [pdf

    cs.LG cs.NI eess.SP

    Tiny Graph Neural Networks for Radio Resource Management

    Authors: Ahmad Ghasemi, Hossein Pishro-Nik

    Abstract: The surge in demand for efficient radio resource management has necessitated the development of sophisticated yet compact neural network architectures. In this paper, we introduce a novel approach to Graph Neural Networks (GNNs) tailored for radio resource management by presenting a new architecture: the Low Rank Message Passing Graph Neural Network (LR-MPGNN). The cornerstone of LR-MPGNN is the i… ▽ More

    Submitted 28 March, 2024; originally announced March 2024.

    Comments: Accepted as a full paper by the tinyML Research Symposium 2024

  2. arXiv:2211.15866  [pdf, other

    cs.RO cs.CV cs.LG

    A Search and Detection Autonomous Drone System: from Design to Implementation

    Authors: Mohammadjavad Khosravi, Rushiv Arora, Saeede Enayati, Hossein Pishro-Nik

    Abstract: Utilizing autonomous drones or unmanned aerial vehicles (UAVs) has shown great advantages over preceding methods in support of urgent scenarios such as search and rescue (SAR) and wildfire detection. In these operations, search efficiency in terms of the amount of time spent to find the target is crucial since with the passing of time the survivability of the missing person decreases or wildfire m… ▽ More

    Submitted 28 November, 2022; originally announced November 2022.

  3. arXiv:2108.12336  [pdf, other

    cs.CR cs.IT

    Superstring-Based Sequence Obfuscation to Thwart Pattern Matching Attacks

    Authors: Bo Guan, Nazanin Takbiri, Dennis Goeckel, Amir Houmansadr, Hossein Pishro-Nik

    Abstract: User privacy can be compromised by matching user data traces to records of their previous behavior. The matching of the statistical characteristics of traces to prior user behavior has been widely studied. However, an adversary can also identify a user deterministically by searching data traces for a pattern that is unique to that user. Our goal is to thwart such an adversary by applying small art… ▽ More

    Submitted 27 August, 2021; originally announced August 2021.

  4. arXiv:2007.06119  [pdf, other

    cs.CR

    Asymptotic Privacy Loss due to Time Series Matching of Dependent Users

    Authors: Nazanin Takbiri, Minting Chen, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik

    Abstract: The Internet of Things (IoT) promises to improve user utility by tuning applications to user behavior, but revealing the characteristics of a user's behavior presents a significant privacy risk. Our previous work has established the challenging requirements for anonymization to protect users' privacy in a Bayesian setting in which we assume a powerful adversary who has perfect knowledge of the pri… ▽ More

    Submitted 12 July, 2020; originally announced July 2020.

  5. arXiv:1912.02209  [pdf, other

    cs.IT eess.SP

    Leveraging Prior Knowledge Asymmetries in the Design of Location Privacy-Preserving Mechanisms

    Authors: Nazanin Takbiri, Virat Shejwalker, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik

    Abstract: The prevalence of mobile devices and Location-Based Services (LBS) necessitate the study of Location Privacy-Preserving Mechanisms (LPPM). However, LPPMs reduce the utility of LBS due to the noise they add to users' locations. Here, we consider the remapping technique, which presumes the adversary has a perfect statistical model for the user location. We consider this assumption and show that unde… ▽ More

    Submitted 4 December, 2019; originally announced December 2019.

    Comments: Submitted to IEEE Wireless Communications Letters

  6. arXiv:1911.05624  [pdf, other

    cs.IT cs.DS eess.SP

    Multi-Purpose Aerial Drones for Network Coverage and Package Delivery

    Authors: Mohammadjavad Khosravi, Hamid Saeedi, Hossein Pishro-Nik

    Abstract: Unmanned aerial vehicles (UAVs) have become important in many applications including last-mile deliveries, surveillance and monitoring, and wireless networks. This paper aims to design UAV trajectories that simultaneously perform multiple tasks. We aim to design UAV trajectories that minimize package delivery time, and at the same time provide uniform coverage over a neighborhood area which is nee… ▽ More

    Submitted 13 November, 2019; originally announced November 2019.

  7. arXiv:1910.08679  [pdf, other

    cs.CR cs.IT

    Improving Privacy in Graphs Through Node Addition

    Authors: Nazanin Takbiri, Xiaozhe Shao, Lixin Gao, Hossein Pishro-Nik

    Abstract: The rapid growth of computer systems which generate graph data necessitates employing privacy-preserving mechanisms to protect users' identity. Since structure-based de-anonymization attacks can reveal users' identity's even when the graph is simply anonymized by employing naive ID removal, recently, $k-$anonymity is proposed to secure users' privacy against the structure-based attack. Most of the… ▽ More

    Submitted 18 October, 2019; originally announced October 2019.

    Comments: Graph Privacy

    Journal ref: 57th Annual Allerton Conference on Communication, Control, and Computing 2019

  8. Resource Management and Admission Control for Tactile Internet in Next Generation of RAN

    Authors: Narges Gholipoor, Saeedeh Parsaeefard, Mohammad Reza Javan, Nader Mokari, Hamid Saeedi, Hossein Pishro-Nik

    Abstract: In this paper, a new queuing model for the Tactile Internet (TI) is proposed for the cloud radio access network (C-RAN) architecture of the next generation wireless networks, e.g., 5G, assisted via orthogonal frequency division multiple access (OFDMA) technology. This model includes both the radio remote head (RRH) and baseband processing unit (BBU) queuing delays and reliability for each end to e… ▽ More

    Submitted 8 November, 2019; v1 submitted 30 June, 2019; originally announced July 2019.

    Comments: arXiv admin note: substantial text overlap with arXiv:1901.09389

  9. arXiv:1902.06404  [pdf, other

    cs.IT

    Asymptotic Limits of Privacy in Bayesian Time Series Matching

    Authors: Nazanin Takbiri, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik

    Abstract: Various modern and highly popular applications make use of user data traces in order to offer specific services, often for the purpose of improving the user's experience while using such applications. However, even when user data is privatized by employing privacy-preserving mechanisms (PPM), users' privacy may still be compromised by an external party who leverages statistical matching methods to… ▽ More

    Submitted 18 February, 2019; originally announced February 2019.

    Comments: The 53rd Annual Conference on Information Sciences and Systems

    Journal ref: The 53rd Annual Conference on Information Sciences and Systems 2019

  10. arXiv:1901.09389  [pdf, other

    cs.NI

    Cloud-based Queuing Model for Tactile Internet in Next Generation of RAN

    Authors: Narges Gholipoor, Saeedeh Parsaeefard, Mohammad Reza Javan, Nader Mokari, Hamid Saeedi, Hossein Pishro-Nik

    Abstract: Ultra-low latency is the most important requirement of the Tactile Internet (TI), which is one of the proposed services for the next-generation wireless network (NGWN), e.g., fifth generation (5G) network. In this paper, a new queuing model for the TI is proposed for the cloud radio access network (CRAN) architecture of the NGWN by applying power domain non-orthogonal multiple access (PD-NOMA) tec… ▽ More

    Submitted 8 November, 2019; v1 submitted 27 January, 2019; originally announced January 2019.

  11. arXiv:1809.10289  [pdf, other

    cs.IT

    Asymptotic Loss in Privacy due to Dependency in Gaussian Traces

    Authors: Nazanin Takbiri, Ramin Soltani, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik

    Abstract: The rapid growth of the Internet of Things (IoT) necessitates employing privacy-preserving techniques to protect users' sensitive information. Even when user traces are anonymized, statistical matching can be employed to infer sensitive information. In our previous work, we have established the privacy requirements for the case that the user traces are instantiations of discrete random variables a… ▽ More

    Submitted 18 February, 2019; v1 submitted 26 September, 2018; originally announced September 2018.

    Comments: IEEE Wireless Communications and Networking Conference

  12. arXiv:1806.11108  [pdf, other

    cs.IT

    Privacy of Dependent Users Against Statistical Matching

    Authors: Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik

    Abstract: Modern applications significantly enhance user experience by adapting to each user's individual condition and/or preferences. While this adaptation can greatly improve a user's experience or be essential for the application to work, the exposure of user data to the application presents a significant privacy threat to the users\textemdash even when the traces are anonymized\textemdash since the sta… ▽ More

    Submitted 29 May, 2019; v1 submitted 28 June, 2018; originally announced June 2018.

    Comments: Submitted to IEEE Transaction on Information Theory

  13. arXiv:1805.01296  [pdf, other

    cs.IT

    Privacy against Statistical Matching: Inter-User Correlation

    Authors: Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik

    Abstract: Modern applications significantly enhance user experience by adapting to each user's individual condition and/or preferences. While this adaptation can greatly improve utility or be essential for the application to work (e.g., for ride-sharing applications), the exposure of user data to the application presents a significant privacy threat to the users, even when the traces are anonymized, since t… ▽ More

    Submitted 27 June, 2018; v1 submitted 2 May, 2018; originally announced May 2018.

    Comments: arXiv admin note: text overlap with arXiv:1702.02701 and arXiv:1710.00197

    Journal ref: ISIT 2018

  14. arXiv:1710.00197  [pdf, other

    cs.IT cs.CR

    Matching Anonymized and Obfuscated Time Series to Users' Profiles

    Authors: Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik

    Abstract: Many popular applications use traces of user data to offer various services to their users. However, even if user data is anonymized and obfuscated, a user's privacy can be compromised through the use of statistical matching techniques that match a user trace to prior user behavior. In this work, we derive the theoretical bounds on the privacy of users in such a scenario. We build on our recent st… ▽ More

    Submitted 27 June, 2018; v1 submitted 30 September, 2017; originally announced October 2017.

    Comments: 48 pages, 12 figures, Submitted to IEEE Transactions on Information Theory

  15. arXiv:1706.06439  [pdf, other

    cs.IT

    A New Multiple Access Technique for 5G: Power Domain Sparse Code Multiple Access (PSMA)

    Authors: Nader Mokari, Mohammad. R Javan, Mohammad Moltafet, Hamid Saeedi, Hossein Pishro-Nik

    Abstract: In this paper, a new approach for multiple access (MA) in fifth generation (5G) of cellular networks called power domain sparse code multiple access (PSMA) is proposed. In PSMA, we adopt both the power domain and the code domain to transmit multiple users' signals over a subcarrier simultaneously. In such a model, the same SCMA codebook can be used by multiple users where, for these users, power d… ▽ More

    Submitted 20 June, 2017; originally announced June 2017.

    Comments: 11 pages, 8 figures, journal

    MSC Class: 90C11 ACM Class: G.1.6

  16. Energy-Efficient Secrecy in Wireless Networks Based on Random Jamming

    Authors: Azadeh Sheikholeslami, Majid Ghaderi, Hossein Pishro-Nik, Dennis Goeckel

    Abstract: This paper considers secure energy-efficient routing in the presence of multiple passive eavesdroppers. Previous work in this area has considered secure routing assuming probabilistic or exact knowledge of the location and channel-state-information (CSI) of each eavesdropper. In wireless networks, however, the locations and CSIs of passive eavesdroppers are not known, making it challenging to guar… ▽ More

    Submitted 15 March, 2017; originally announced March 2017.

  17. arXiv:1610.05210  [pdf, other

    cs.IT

    Achieving Perfect Location Privacy in Wireless Devices Using Anonymization

    Authors: Zarrin Montazeri, Amir Houmansadr, Hossein Pishro-Nik

    Abstract: The popularity of mobile devices and location-based services (LBS) has created great concern regarding the location privacy of their users. Anonymization is a common technique that is often used to protect the location privacy of LBS users. Here, we present an information-theoretic approach to define the notion of perfect location privacy. We show how LBS's should use the anonymization method to e… ▽ More

    Submitted 19 January, 2017; v1 submitted 17 October, 2016; originally announced October 2016.

    Comments: 12 pages, 3 figures

  18. arXiv:1502.00997   

    cs.NI cs.IT eess.SY

    Driver-Based Adaptation of Vehicular Ad Hoc Networks for Design of Active Safety Systems

    Authors: Ali Rakhshan, Hossein Pishro-Nik, Mohammad Nekoui

    Abstract: This paper studies the need for individualizing vehicular communications in order to improve collision warning systems for an N-lane highway scenario. By relating the traffic-based and communications studies, we aim at reducing highway traffic accidents. To the best of our knowledge, this is the first paper that shows how to customize vehicular communications to driver's characteristics and traffi… ▽ More

    Submitted 1 March, 2019; v1 submitted 3 February, 2015; originally announced February 2015.

    Comments: A major reason: Since now CV2X has considerable advantages over 802.11p and it can be the next specification used for V2X communication, I'd like to withdraw this paper in order to make it easier for the readers to find the best papers in the area. See: https://www.qualcomm.com/news/onq/2018/04/25/lets-set-record-straight-c-v2x

  19. Jamming Based on an Ephemeral Key to Obtain Everlasting Security in Wireless Environments

    Authors: Azadeh Sheikholeslami, Dennis Goeckel, Hossein Pishro-Nik

    Abstract: Secure communication over a wiretap channel is considered in the disadvantaged wireless environment, where the eavesdropper channel is (possibly much) better than the main channel. We present a method to exploit inherent vulnerabilities of the eavesdropper's receiver to obtain everlasting secrecy. Based on an ephemeral cryptographic key pre-shared between the transmitter Alice and the intended rec… ▽ More

    Submitted 13 November, 2014; originally announced December 2014.

    Journal ref: IEEE Transactions on Wireless Communications, Volume: 14, Issue: 11, Pages: 6072 - 6081, 2015

  20. Energy-Efficient Routing in Wireless Networks in the Presence of Jamming

    Authors: Azadeh Sheikholeslami, Majid Ghaderi, Hossein Pishro-Nik, Dennis Goeckel

    Abstract: The effectiveness and simple implementation of physical layer jammers make them an essential threat for wireless networks. In a multihop wireless network, where jammers can interfere with the transmission of user messages at intermediate nodes along the path, one can employ jamming oblivious routing and then employ physical-layer techniques (e.g. spread spectrum) to suppress jamming. However, wher… ▽ More

    Submitted 13 September, 2016; v1 submitted 13 November, 2014; originally announced November 2014.

    Journal ref: IEEE Transactions on Wireless Communications, 2016

  21. arXiv:1408.4111  [pdf, other

    cs.OH stat.AP

    A New Approach to Customization of Collision Warning Systems to Individual Drivers

    Authors: Ali Rakhshan, Evan Ray, Hossein Pishro-Nik

    Abstract: This paper discusses the need for individualizing safety systems and proposes an approach including the Real-Time estimation of the distribution of brake response times for an individual driver. While maintaining high level of safety, the collision warning system should send "tailored" responses to the driver. This method could be the first step to show that safety applications would potentially b… ▽ More

    Submitted 16 December, 2015; v1 submitted 15 August, 2014; originally announced August 2014.

  22. arXiv:1405.6161  [pdf, other

    cs.OH eess.SY

    Real-Time Estimation of the Distribution of Brake Response Times for an Individual Driver Using Vehicular Ad Hoc Network

    Authors: Ali Rakhshan, Evan Ray, Hossein Pishro-Nik

    Abstract: Adapting the functioning of the collision warning systems to the specific drivers' characteristics is of great benefit to drivers. For example, by customizing collision warning algorithms we can minimize false alarms, thereby reducing injuries and deaths in highway traffic accidents. In order to take the behaviors of individual drivers into account, the system needs to have a Real-Time estimation… ▽ More

    Submitted 29 April, 2014; originally announced May 2014.

  23. arXiv:1402.0932   

    cs.NI

    Tuning Collision Warning Algorithms to Individual Drivers for Design of Active Safety Systems

    Authors: Ali Rakhshan, Hossein Pishro-Nik, Donald L. Fisher, Mohammad Nekoui

    Abstract: Every year, many people are killed and injured in highway traffic accidents. In order to reduce such casualties, collisions warning systems has been studied extensively. These systems are built by taking the driver reaction times into account. However, most of the existing literature focuses on characterizing how driver reaction times vary across an entire population. Therefore, many of the warnin… ▽ More

    Submitted 1 March, 2019; v1 submitted 4 February, 2014; originally announced February 2014.

    Comments: A major reason: Since now CV2X has considerable advantages over 802.11p and it can be the next specification used for V2X communication, I'd like to withdraw this paper in order to make it easier for the readers to find the best papers in the area. See: https://www.qualcomm.com/news/onq/2018/04/25/lets-set-record-straight-c-v2x

  24. arXiv:1211.2198  [pdf, ps, other

    cs.IT

    Results on Finite Wireless Sensor Networks: Connectivity and Coverage

    Authors: Ali Eslami, Mohammad Nekoui, Hossein Pishro-Nik, F. Fekri

    Abstract: Many analytic results for the connectivity, coverage, and capacity of wireless networks have been reported for the case where the number of nodes, $n$, tends to infinity (large-scale networks). The majority of these results have not been extended for small or moderate values of $n$; whereas in many practical networks, $n$ is not very large. In this paper, we consider finite (small-scale) wireless… ▽ More

    Submitted 9 November, 2012; originally announced November 2012.

  25. arXiv:1211.2187  [pdf, ps, other

    cs.IT

    On Finite-Length Performance of Polar Codes: Stopping Sets, Error Floor, and Concatenated Design

    Authors: Ali Eslami, H. Pishro-Nik

    Abstract: This paper investigates properties of polar codes that can be potentially useful in real-world applications. We start with analyzing the performance of finite-length polar codes over the binary erasure channel (BEC), while assuming belief propagation as the decoding method. We provide a stopping set analysis for the factor graph of polar codes, where we find the size of the minimum stopping set. W… ▽ More

    Submitted 9 November, 2012; originally announced November 2012.

  26. arXiv:1210.1790  [pdf, ps, other

    cs.CR cs.IT

    Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper's Receiver

    Authors: Azadeh Sheikholeslami, Dennis Goeckel, Hossein Pishro-Nik

    Abstract: Secure communication over a memoryless wiretap channel in the presence of a passive eavesdropper is considered. Traditional information-theoretic security methods require an advantage for the main channel over the eavesdropper channel to achieve a positive secrecy rate, which in general cannot be guaranteed in wireless systems. Here, we exploit the non-linear conversion operation in the eavesdropp… ▽ More

    Submitted 15 November, 2013; v1 submitted 5 October, 2012; originally announced October 2012.

  27. arXiv:1107.5355  [pdf, ps, other

    cs.IT

    A Practical Approach to Polar Codes

    Authors: Ali Eslami, Hossein Pishro-Nik

    Abstract: In this paper, we study polar codes from a practical point of view. In particular, we study concatenated polar codes and rate-compatible polar codes. First, we propose a concatenation scheme including polar codes and Low-Density Parity-Check (LDPC) codes. We will show that our proposed scheme outperforms conventional concatenation schemes formed by LDPC and Reed-Solomon (RS) codes. We then study t… ▽ More

    Submitted 26 July, 2011; originally announced July 2011.