Loading...
Search for:
yassaee--m--h
0.139 seconds
Total 23096 records
One-shot achievability via fidelity
, Article IEEE International Symposium on Information Theory - Proceedings, 14 June 2015 through 19 June 2015 ; Volume 2015-June , 2015 , Pages 301-305 ; 21578095 (ISSN) ; 9781467377041 (ISBN) ; Sharif University of Technology
2015
Abstract
This paper provides a universal framework for establishing one-shot achievability results for coordination and secrecy problems. The framework is built on our previous framework [Yassaee et al. 13] for proving one-shot achievability results in the context of source and channel coding problems. In the coordination and secrecy problems, one needs to compare an induced distribution by encoding/decoding with an ideal distribution (satisfying some desirable properties) using a suitable criterion. In this paper, we use fidelity as a criterion for measuring the closeness of induced distribution with the ideal distribution. The framework exploits the stochastic mutual information coders at the...
A Correlation Measure Based on Vector-Valued Lp -Norms
, Article IEEE Transactions on Information Theory ; Volume 65, Issue 12 , 2019 , Pages 7985-8004 ; 00189448 (ISSN) ; Beigi, S ; Gohari, A ; Yassaee, M. H ; Aref, M. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2019
Abstract
In this paper, we introduce a new measure of correlation for bipartite quantum states. This measure depends on a parameter α , and is defined in terms of vector-valued Lp -norms. The measure is within a constant of the exponential of α -Rényi mutual information, and reduces to the trace norm (total variation distance) for α =1. We will prove some decoupling type theorems in terms of this measure of correlation, and present some applications in privacy amplification as well as in bounding the random coding exponents. In particular, we establish a bound on the secrecy exponent of the wiretap channel (under the total variation metric) in terms of the α -Rényi mutual information according to...
A correlation measure based on vector-valued Lp norms
, Article 2019 IEEE International Symposium on Information Theory, ISIT 2019, 7 July 2019 through 12 July 2019 ; Volume 2019-July , 2019 , Pages 1132-1136 ; 21578095 (ISSN); 9781538692912 (ISBN) ; Beigi, S ; Gohari, A ; Yassaee, M. H ; Aref, M. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2019
Abstract
In this paper, a new measure of correlation is introduced. This measure depends on a parameter α, and is defined in terms of vector-valued Lp norms. The measure is within a constant of the exponential of α-Rényi mutual information, and reduces to the trace norm (total variation distance) for α = 1. We provide some properties and applications of this measure of correlation. In particular, we establish a bound on the secrecy exponent of the wiretap channel (under the total variation metric) in terms of the α-Rényi mutual information according to Csiszár's proposal. © 2019 IEEE
Slepian-Wolf coding over cooperative relay networks
, Article IEEE Transactions on Information Theory ; Volume 57, Issue 6 , June , 2011 , Pages 3462-3482 ; 00189448 (ISSN) ; Aref, M. R ; Sharif University of Technology
2011
Abstract
This paper deals with the problem of multicasting a set of discrete memoryless correlated sources (DMCS) over a cooperative relay network. Necessary conditions with cut-set interpretation are presented. A Joint source-Wyner-Ziv encoding/sliding window decoding scheme is proposed, in which decoding at each receiver is done with respect to an ordered partition of other nodes. For each ordered partition a set of feasibility constraints is derived. Then, utilizing the submodular property of the entropy function and a novel geometrical approach, the results of different ordered partitions are consolidated, which lead to sufficient conditions for our problem. The proposed scheme achieves...
Multiple access wiretap channels with strong secrecy
, Article 2010 IEEE Information Theory Workshop, ITW 2010 - Proceedings, 30 August 2010 through 3 September 2010, Dublin ; 2010 ; 9781424482641 (ISBN) ; Aref, M. R ; Sharif University of Technology
2010
Abstract
The problem of secure communication over multiple-Access Wiretap channel (MAC-WTC) under strong secrecy criterion is investigated. A new technique based on channel output statistics approximation is developed for establishing the strong security over multi-user channels. In particular, this technique shows that how simple wiretap coding results in secure communication under strong secrecy criterion instead of weak secrecy criterion. As a side result of the paper, two results on the output statistics of MAC are provided. Such results can be used to approximate the mutual information between input and output of MAC with respect to a given codebook of arbitrary rate
Slepian-wolf coding over cooperative networks
, Article 2009 IEEE International Symposium on Information Theory, ISIT 2009, Seoul, 28 June 2009 through 3 July 2009 ; 2009 , Pages 879-883 ; 21578102 (ISSN); 9781424443130 (ISBN) ; Aref, M. R ; Sharif University of Technology
2009
Abstract
We present sufficient conditions for multicasting a set of correlated sources over cooperative networks. We propose a joint source-Wyner-Ziv encoding/sliding-window decoding scheme, in which each receiver considers an ordered partition of the other nodes. For each ordered partition, we obtain a set of feasibility constraints . We consolidate the results of the different ordered partitions by utilizing a result of geometrical approach to obtain the sufficient conditions. We observe that these sufficient conditions are indeed necessary conditions for Aref networks. As a consequence of the main result, we obtain an achievable rate region for networks with multicast demands. Also, we deduce an...
Generalized compress-and-forward strategy for relay networks
, Article 2008 IEEE International Symposium on Information Theory, ISIT 2008, Toronto, ON, 6 July 2008 through 11 July 2008 ; 2008 , Pages 2683-2687 ; 21578101 (ISSN) ; 9781424422579 (ISBN) ; Aref, M. R ; Sharif University of Technology
2008
Abstract
In this paper, we present a new generalization of the well-known Compress-and-Forward strategy for relay networks. We propose an offset decoding at destination, where destination considers an ordered partition of relays and decodes information of any partition with the help of information from prior partitions. We show that when we do not partition the set of relays, our result improves the result of Kramer, et al. A geometrical method is utilized to unify results of different ordered partitioning. Also, the unified result has a celebrated source-channel coding separation interpretation. © 2008 IEEE
Achievability proof via output statistics of random binning
, Article IEEE Transactions on Information Theory ; Vol. 60, issue. 11 , July , 2014 , pages 6760-6786 ; 21578095 ; 978-1-4673-2580-6 ; Aref, M. R ; Gohari, A ; Sharif University of Technology
2014
Abstract
This paper introduces a new and ubiquitous framework for establishing achievability results in network information theory problems. The framework uses random binning arguments and is based on a duality between channel and source coding problems. Furthermore, the framework uses pmf approximation arguments instead of counting and typicality. This allows for proving coordination and strong secrecy problems, where certain statistical conditions on the distribution of random variables need to be satisfied. These statistical conditions include independence between messages and eavesdropper's observations in secrecy problems and closeness to a certain distribution (usually, i.i.d. distribution) in...
Non-asymptotic output statistics of Random Binning and its applications
, Article IEEE International Symposium on Information Theory - Proceedings, Istanbul ; July , 2013 , Pages 1849-1853 ; 21578095 (ISSN); 9781479904464 (ISBN) ; Aref, M. R ; Gohari, A ; Sharif University of Technology
2013
Abstract
In this paper we develop a finite blocklength version of the Output Statistics of Random Binning (OSRB) framework. This framework is shown to be optimal in the point-to-point case. New second order regions for broadcast channel and wiretap channel with strong secrecy criterion are derived
Achievability proof via output statistics of random binning
, Article IEEE International Symposium on Information Theory - Proceedings ; 2012 , Pages 1044-1048 ; 9781467325790 (ISBN) ; Aref, M. R ; Gohari, A ; Sharif University of Technology
2012
Abstract
This paper presents a new and ubiquitous framework for establishing achievability results in network information theory (NIT) problems. The framework is used to prove various new results. To express the main tool, consider a set of discrete memoryless correlated sources (DMCS). Assume that each source (except one, Z n) is randomly binned at a finite rate. We find sufficient conditions on these rates such that the bin indices are nearly mutually independent of each other and of Z n. This is used in conjunction with the Slepian-Wolf (S-W) result to set up the framework. We begin by illustrating this method via examples from channel coding and rate-distortion (or covering problems). Next, we...
Channel simulation via interactive communications
, Article IEEE International Symposium on Information Theory - Proceedings ; 2012 , Pages 3053-3057 ; 9781467325790 (ISBN) ; Gohari, A ; Aref, M. R ; Sharif University of Technology
IEEE
2012
Abstract
In this paper, we study the problem of channel simulation via interactive communication, known as the coordination capacity, in a two-terminal network. We assume that two terminals observe i.i.d. copies of two random variables and would like to generate i.i.d. copies of two other random variables jointly distributed with the observed random variables. The terminals are provided with two-way communication links, and shared common randomness, all at limited rates. Two special cases of this problem are the interactive function computation studied by Ma and Ishwar, and the tradeoff curve between one-way communication and shared randomness studied by Cuff. The latter work had inspired Gohari and...
Secure noisy network coding
, Article 2013 Iran Workshop on Communication and Information Theory ; 2013 ; 9781467350235 (ISBN) ; Aref, M. R ; Gohari, A ; Sharif University of Technology
2013
Abstract
In this paper we use the Output Statistics of Random Binning (ORSB) framework to extend the noisy network coding of Lim et al. to include an eavesdropper
A technique for deriving one-shot achievability results in network information theory
, Article IEEE International Symposium on Information Theory - Proceedings ; 2013 , Pages 1287-1291 ; ISSN: 21578095 ; ISBN: 9781479904464 ; Aref, M. R ; Gohari, A ; IEEE; IEEE Information Theory Society ; Sharif University of Technology
2013
Abstract
This paper proposes a novel technique to prove a one-shot version of achievability results in network information theory. The technique is not based on covering and packing lemmas. In this technique, we use a stochastic encoder and decoder with a particular structure for coding that resembles both the ML and the joint-typicality coders. Although stochastic encoders and decoders do not usually enhance the capacity region, their use simplifies the analysis. The Jensen inequality lies at the heart of error analysis, which enables us to deal with the expectation of many terms coming from stochastic encoders and decoders at once. The technique is illustrated via four examples: point-to-point...
Learning under distribution mismatch and model misspecification
, Article 2021 IEEE International Symposium on Information Theory, ISIT 2021, 12 July 2021 through 20 July 2021 ; Volume 2021-July , 2021 , Pages 2912-2917 ; 21578095 (ISSN); 9781538682098 (ISBN) ; Gohari, A ; Yassaee, M. H ; Aref, M. R ; IEEE Information Theory Society; The Institute of Electrical and Electronics Engineers ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2021
Abstract
We study learning algorithms when there is a mismatch between the distributions of the training and test datasets of a learning algorithm. The effect of this mismatch on the generalization error and model misspecification are quantified. Moreover, we provide a connection between the generalization error and the rate-distortion theory, which allows one to utilize bounds from the rate-distortion theory to derive new bounds on the generalization error and vice versa. In particular, the rate-distortion-based bound strictly improves over the earlier bound by Xu and Raginsky even when there is no mismatch. We also discuss how 'auxiliary loss functions' can be utilized to obtain upper bounds on the...
Correlated Stochastic Block Models and Graph Matching
, M.Sc. Thesis Sharif University of Technology ; Yassaee, Mohammad Hossein (Supervisor)
Abstract
Stochastic block models are the most common statistical models for simulating graphs with block structures. These models have been studied extensively for community detection problem and evaluating the performance of algorithms for community detection. Commu- nity detection has various applications in the study of social networks, protein networks, image processing, and natural language processing. In the classical setting, community detection is studied when only one graph is available. In 2021, a model for correlated stochastic block graphs was introduced, in which multiple edge-correlated graphs with the same block structure are observed. In this model, node labels are not available,...
Interpretability of Machine Learning Algorithms through the Lens of Causal Inference
, M.Sc. Thesis Sharif University of Technology ; Mohammad Hossein Yassaee (Supervisor)
Abstract
Machine learning is becoming increasingly popular for solving various problems, and it has become a big part of our daily lives. However, with the use of complex machine learning models, it is important to explain how these algorithms work. Knowing why a model makes a certain prediction can be just as important as the accuracy of that prediction in many applications. Unfortunately, the highest accuracies for large data sets are often achieved by complex models that are difficult to interpret even for the designers. Therefore, the interpretability of machine learning algorithms has become just as important as their accuracy. Recently, different methods have been proposed to help users...
New Approaches for Achievability Proof in Network Information Theory: Asymptotic Regime and Beyond
, Ph.D. Dissertation Sharif University of Technology ; Aref, Mohammad Reza (Supervisor)
Abstract
Two new frameworks for achievability proof in network information theory (NIT) are introduced . The first framework which we call it OSRB (Output Statistics of Random Binning) framework, uses random binning arguments and is based on a duality between channel and source coding problems. Furthermore, the OSRB framework uses pmf approximation arguments instead of counting and typicality which are used widely in conventional achievability proofs in NIT. This allows for proving coordination and strong secrecy problems, where certain statistical conditions on the
distribution of random variables need to be satisfied. These statistical conditions include independence between messages and...
distribution of random variables need to be satisfied. These statistical conditions include independence between messages and...
Security and Cooperation in Multi-User Information Theory
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor)
Abstract
In this thesis, we study the role of cooperation and security in multi-user channel from an information theoretic point of view. First, we review the wiretap channel as a fundamental model for the study of confidentiality in information theoretic security. To do this, we first introduce two measures for measuring the level of secrecy of confidential message, namely, average equivocation rate (AER) and equivocation rate in probability (ERP). By using a new proof, based on random covering, we show that the capacity-equivocation region of wiretap channel under AER and ERP is the same. To study cooperation in multi-user channel, we introduce the cooperative network in which each user can...
Optimal MIMO waveform design with controlled characteristics
, Article Proceedings International Radar Symposium, 24 June 2015 through 26 June 2015 ; Volume 2015-August , 2015 , Pages 1141-1146 ; 21555753 (ISSN) ; 9783954048533 (ISBN); 9783954048533 (ISBN); 9783954048533 (ISBN) ; Radmard, M ; Nayebi, M. M ; Bastani, M. H ; Rohling, H ; Rohling, H ; Rohling, H ; Sharif University of Technology
IEEE Computer Society
2015
Abstract
In a MIMO (Multiple Input Multiple Output) radar system, proper design of transmit signal and receive filter is an advantageous tool to improve the detection performance. Thus, in this paper, we consider the problem of transmit code and receive filter design, in order to maximize the Signal to Noise Ratio (SNR) at the receiver while enforcing a similarity constraint between the transmit space-time code (STC) and a reference STC which has a desirable ambiguity function. We will show that by solving such constrained optimization problem through successive iterations, our proposed method leads to satisfactory results
A fast and novel method of pattern synthesis for non-uniform phased array antennas
, Article Proceedings International Radar Symposium, 24 June 2015 through 26 June 2015 ; Volume 2015-August , 2015 , Pages 924-929 ; 21555753 (ISSN) ; 9783954048533 (ISBN); 9783954048533 (ISBN); 9783954048533 (ISBN) ; Sebt, M. A ; Nayebi, M. M ; Behroozi, H ; Rohling, H ; Rohling, H ; Rohling, H ; Sharif University of Technology
IEEE Computer Society
2015
Abstract
Weighting elements to achieve radiation patterns with desired characteristics is a classical work in phased array antennas. These characteristics can be low sidelobe level, narrow beamwidth, high directivity, pattern nulling in special angle and etc. For each of these characteristics, different methods have been introduced. Most of methods have been presented for uniform arrays, however there are lots of methods to obtain a desired pattern for antennas with non-uniform element distances. The problem with these methods is complexity or not very good results. In this paper, fast and easy methods based on Least Square Error that leads to good results are presented. In addition, weighting of...