Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–19 of 19 results for author: Yassaee, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.00454  [pdf, ps, other

    cs.LG cs.IT stat.ML

    Robust Semi-supervised Learning via $f$-Divergence and $α$-Rényi Divergence

    Authors: Gholamali Aminian, Amirhossien Bagheri, Mahyar JafariNodeh, Radmehr Karimian, Mohammad-Hossein Yassaee

    Abstract: This paper investigates a range of empirical risk functions and regularization methods suitable for self-training methods in semi-supervised learning. These approaches draw inspiration from various divergence measures, such as $f$-divergences and $α$-Rényi divergences. Inspired by the theoretical foundations rooted in divergences, i.e., $f$-divergences and $α$-Rényi divergence, we also provide val… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

    Comments: Accepted in ISIT 2024

  2. arXiv:2304.12606  [pdf, ps, other

    cs.IT

    Statistics of Random Binning Based on Tsallis Divergence

    Authors: Masoud Kavian, Mohammad Mahdi Mojahedian, Mohammad Hossein Yassaee, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: Random binning is a widely utilized tool in information theory, finding applications in various domains. In this paper, we focus on the output statistics of random binning (OSRB) using the Tsallis divergence $T_α$. Our investigation encompasses all values of $α$ within the range of $(0,\infty)$. The proofs provided in this paper cover both the achievability and converse aspects. To accommodate the… ▽ More

    Submitted 13 February, 2024; v1 submitted 25 April, 2023; originally announced April 2023.

  3. arXiv:2206.11042  [pdf, other

    cs.IT cs.LG

    f-divergences and their applications in lossy compression and bounding generalization error

    Authors: Saeed Masiha, Amin Gohari, Mohammad Hossein Yassaee

    Abstract: In this paper, we provide three applications for $f$-divergences: (i) we introduce Sanov's upper bound on the tail probability of the sum of independent random variables based on super-modular $f$-divergence and show that our generalized Sanov's bound strictly improves over ordinary one, (ii) we consider the lossy compression problem which studies the set of achievable rates for a given distortion… ▽ More

    Submitted 26 January, 2023; v1 submitted 21 June, 2022; originally announced June 2022.

  4. arXiv:2109.14703  [pdf, other

    cs.LG cs.AI cs.DC cs.MA math.ST

    Sequential Estimation under Multiple Resources: a Bandit Point of View

    Authors: Alireza Masoumian, Shayan Kiyani, Mohammad Hossein Yassaee

    Abstract: The problem of Sequential Estimation under Multiple Resources (SEMR) is defined in a federated setting. SEMR could be considered as the intersection of statistical estimation and bandit theory. In this problem, an agent is confronting with k resources to estimate a parameter $θ$. The agent should continuously learn the quality of the resources by wisely choosing them and at the end, proposes an es… ▽ More

    Submitted 29 September, 2021; originally announced September 2021.

    Comments: 19 pages, 1 figure, 1 algorithm

  5. arXiv:2102.05695  [pdf, other

    cs.IT

    Learning under Distribution Mismatch and Model Misspecification

    Authors: Saeed Masiha, Amin Gohari, Mohammad Hossein Yassaee, Mohammad Reza Aref

    Abstract: We study learning algorithms when there is a mismatch between the distributions of the training and test datasets of a learning algorithm. The effect of this mismatch on the generalization error and model misspecification are quantified. Moreover, we provide a connection between the generalization error and the rate-distortion theory, which allows one to utilize bounds from the rate-distortion the… ▽ More

    Submitted 10 August, 2022; v1 submitted 10 February, 2021; originally announced February 2021.

    Comments: 25 pages, 4 figures

  6. arXiv:2012.01706  [pdf, other

    cs.IT

    State Masking Over a Two-State Compound Channel

    Authors: Sadaf Salehkalaibar, Mohammad Hossein Yassaee, Vincent Y. F. Tan, Mehrasa Ahmadipour

    Abstract: We consider fundamental limits for communicating over a compound channel when the state of the channel needs to be masked. Our model is closely related to an area of study known as covert communication that is a setting in which the transmitter wishes to communicate to legitimate receiver(s) while ensuring that the communication is not detected by an adversary. The main contribution in our two-sta… ▽ More

    Submitted 3 December, 2020; originally announced December 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:1906.06675

  7. arXiv:1906.06675  [pdf, other

    cs.IT

    Covert Communication Over a Compound Channel

    Authors: Sadaf Salehkalaibar, Mohammad Hossein Yassaee, Vincent Y. F. Tan

    Abstract: In this paper, we consider fundamental communication limits over a compound channel. Covert communication in the information-theoretic context has been primarily concerned with fundamental limits when the transmitter wishes to communicate to legitimate receiver(s) while ensuring that the communication is not detected by an adversary. This paper, however, considers an alternative, and no less impor… ▽ More

    Submitted 16 June, 2019; originally announced June 2019.

  8. arXiv:1902.07956  [pdf, ps, other

    cs.IT

    Almost exact analysis of soft covering lemma via large deviation

    Authors: Mohammad Hossein Yassaee

    Abstract: This paper investigates the soft covering lemma under both the relative entropy and the total variation distance as the measures of deviation. The exact order of the expected deviation of the random i.i.d. code for the soft covering problem problem, is determined. The proof technique used in this paper significantly differs from the previous techniques for deriving exact exponent of the soft cover… ▽ More

    Submitted 21 February, 2019; originally announced February 2019.

  9. arXiv:1901.00179  [pdf, ps, other

    cs.IT

    Sharp Bounds for Mutual Covering

    Authors: Jingbo Liu, Mohammad H. Yassaee, Sergio Verdú

    Abstract: A fundamental tool in network information theory is the covering lemma, which lower bounds the probability that there exists a pair of random variables, among a give number of independently generated candidates, falling within a given set. We use a weighted sum trick and Talagrand's concentration inequality to prove new mutual covering bounds. We identify two interesting applications: 1) When the… ▽ More

    Submitted 16 April, 2019; v1 submitted 1 January, 2019; originally announced January 2019.

    Comments: 33 pages, 1 figure, presented in part at ISIT 2017

  10. arXiv:1805.08026  [pdf, ps, other

    cs.IT quant-ph

    A Correlation Measure Based on Vector-Valued $L_p$-Norms

    Authors: Mohammad Mahdi Mojahedian, Salman Beigi, Amin Gohari, Mohammad Hossein Yassaee, Mohammad Reza Aref

    Abstract: In this paper, we introduce a new measure of correlation for bipartite quantum states. This measure depends on a parameter $α$, and is defined in terms of vector-valued $L_p$-norms. The measure is within a constant of the exponential of $α$-Rényi mutual information, and reduces to the trace norm (total variation distance) for $α=1$. We will prove some decoupling type theorems in terms of this meas… ▽ More

    Submitted 21 May, 2018; originally announced May 2018.

    Comments: 41 pages

  11. arXiv:1305.5901  [pdf, other

    cs.IT

    Simulation of a Channel with Another Channel

    Authors: Farzin Haddadpour, Mohammad Hossein Yassaee, Salman Beigi, Amin Gohari, Mohammad Reza Aref

    Abstract: In this paper, we study the problem of simulating a DMC channel from another DMC channel under an average-case and an exact model. We present several achievability and infeasibility results, with tight characterizations in special cases. In particular for the exact model, we fully characterize when a BSC channel can be simulated from a BEC channel when there is no shared randomness. We also provid… ▽ More

    Submitted 1 December, 2016; v1 submitted 25 May, 2013; originally announced May 2013.

    Comments: 31 pages, 10 figures, and some parts of this work were published at ITW 2013

  12. arXiv:1303.0696  [pdf, ps, other

    cs.IT

    A Technique for Deriving One-Shot Achievability Results in Network Information Theory

    Authors: Mohammad Hossein Yassaee, Mohammad Reza Aref, Amin Gohari

    Abstract: This paper proposes a novel technique to prove a one-shot version of achievability results in network information theory. The technique is not based on covering and packing lemmas. In this technique, we use an stochastic encoder and decoder with a particular structure for coding that resembles both the ML and the joint-typicality coders. Although stochastic encoders and decoders do not usually enh… ▽ More

    Submitted 4 March, 2013; originally announced March 2013.

    Comments: A short version has been submitted to ISIT 2013

  13. arXiv:1303.0695  [pdf, ps, other

    cs.IT

    Non-Asymptotic Output Statistics of Random Binning and Its Applications

    Authors: Mohammad Hossein Yassaee, Mohammad Reza Aref, Amin Gohari

    Abstract: In this paper we develop a finite blocklength version of the Output Statistics of Random Binning (OSRB) framework. The framework is shown to be optimal in the point-to-point case. New second order regions for broadcast channel and wiretap channel with strong secrecy criterion are derived.

    Submitted 4 March, 2013; originally announced March 2013.

    Comments: A shot version has been submitted to ISIT 2013

  14. arXiv:1207.3513  [pdf, ps, other

    cs.IT

    Secure Channel Simulation

    Authors: Amin Gohari, Mohammad Hossein Yassaee, Mohammad Reza Aref

    Abstract: In this paper the Output Statistics of Random Binning (OSRB) framework is used to prove a new inner bound for the problem of secure channel simulation. Our results subsume some recent results on the secure function computation. We also provide an achievability result for the problem of simultaneously simulating a channel and creating a shared secret key. A special case of this result generalizes t… ▽ More

    Submitted 15 July, 2012; originally announced July 2012.

    Comments: Short version to appear at ITW 2012. This will be replaced by a longer version soon

  15. arXiv:1203.3217  [pdf, ps, other

    cs.IT

    Channel simulation via interactive communications

    Authors: Mohammad Hossein Yassaee, Amin Gohari, Mohammad Reza Aref

    Abstract: In this paper, we study the problem of channel simulation via interactive communication, known as the coordination capacity, in a two-terminal network. We assume that two terminals observe i.i.d.\ copies of two random variables and would like to generate i.i.d.\ copies of two other random variables jointly distributed with the observed random variables. The terminals are provided with two-way comm… ▽ More

    Submitted 18 April, 2014; v1 submitted 14 March, 2012; originally announced March 2012.

    Comments: Submitted to IEEE Trans. on Information Theory

  16. arXiv:1203.0731  [pdf, ps, other

    cs.IT

    Coordination via a relay

    Authors: Farzin Haddadpour, Mohammad Hossein Yassaee, Amin Gohari, Mohammad Reza Aref

    Abstract: In this paper, we study the problem of coordinating two nodes which can only exchange information via a relay at limited rates. The nodes are allowed to do a two-round interactive two-way communication with the relay, after which they should be able to generate i.i.d. copies of two random variables with a given joint distribution within a vanishing total variation distance. We prove inner and oute… ▽ More

    Submitted 4 March, 2012; originally announced March 2012.

    Comments: Submitted to ISIT 2012

  17. arXiv:1203.0730  [pdf, other

    cs.IT

    Achievability proof via output statistics of random binning

    Authors: Mohammad Hossein Yassaee, Mohammad Reza Aref, Amin Gohari

    Abstract: This paper introduces a new and ubiquitous framework for establishing achievability results in \emph{network information theory} (NIT) problems. The framework uses random binning arguments and is based on a duality between channel and source coding problems. {Further,} the framework uses pmf approximation arguments instead of counting and typicality. This allows for proving coordination and \emph{… ▽ More

    Submitted 21 August, 2014; v1 submitted 4 March, 2012; originally announced March 2012.

    Comments: IEEE Transactions on Information Theory, accepted

  18. Slepian-Wolf Coding Over Cooperative Relay Networks

    Authors: Mohammad Hossein Yassaee, Mohammad Reza Aref

    Abstract: This paper deals with the problem of multicasting a set of discrete memoryless correlated sources (DMCS) over a cooperative relay network. Necessary conditions with cut-set interpretation are presented. A \emph{Joint source-Wyner-Ziv encoding/sliding window decoding} scheme is proposed, in which decoding at each receiver is done with respect to an ordered partition of other nodes. For each ordered… ▽ More

    Submitted 6 December, 2010; v1 submitted 19 October, 2009; originally announced October 2009.

    Comments: IEEE Transactions on Information Theory, accepted

  19. arXiv:0901.2218  [pdf, ps, other

    cs.IT

    Slepian-Wolf Coding over Cooperative Networks

    Authors: Mohammad Hossein Yassaee, Mohammad Reza Aref

    Abstract: We present sufficient conditions for multicasting a set of correlated sources over cooperative networks. We propose joint source-Wyner-Ziv encoding/sliding-window decoding scheme, in which each receiver considers an ordered partition of other nodes. Subject to this scheme, we obtain a set of feasibility constraints for each ordered partition. We consolidate the results of different ordered parti… ▽ More

    Submitted 15 January, 2009; originally announced January 2009.

    Comments: 5 pages, submitted to ISIT 2009