Ahmed A. Zewail
Pennsylvania State University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Ahmed A. Zewail.
international symposium on information theory | 2017
Ahmed A. Zewail; Aylin Yener
We study a two-hop cache-aided network, where a layer of relay nodes connects a server and a set of end users, i.e., a combination network. We consider the case where both the relay nodes and the end users have caching capabilities. We provide upper and lower bounds which are applicable to any combination network, noting that previous work had focused on models where the relays do not have caches as well as schemes that were suitable for a special class of combination networks. Utilizing maximum distance separable (MDS) codes, we jointly optimize the placement and the delivery phases, demonstrating the impact of cache memories in alleviating the delivery load over the two hop communications. Moreover, we show how cooperation between the relay nodes and the end users can effectively replace the server during the delivery phase whenever the total memory at each end user and its connected relay nodes is sufficient to store the database.
communications and networking symposium | 2016
Ahmed A. Zewail; Aylin Yener
We consider networks where a set of end users, equipped with cache memories, are connected to a single server via a set of relay nodes. We further consider a special class of such networks that satisfy the so called resolvability property and study centralized coded caching scenarios under three security requirements. Under the first scenario, i.e., secure delivery, the wiretapper should not gain any information about the database files from the transmitted signals over the network links. In the second scenario, i.e., secure coded caching, we consider the case where users should not be able to obtain any information about files that they did not request. In the third scenario, the system requires both secure delivery and secure coded caching. We provide achievable schemes by jointly optimizing the cache placement and delivery phases, utilizing secret sharing and one-time pads. We provide numerical results to compare performance under these different requirements.
allerton conference on communication, control, and computing | 2014
Ahmed A. Zewail; Mohamed S. Nafea; Aylin Yener
This paper investigates the impact of cooperation with an untrusted relay in multi-source multi-destination networks. The set up considered is one where the relay is the only means of communications due to the absence of direct links between the sources and the destinations. Since the relay is untrusted, all messages from the sources need to be kept secret from the relay. Furthermore, the destinations are assumed to have different levels of security clearance, i.e., some private messages should only be decoded by their intended receiver and should be kept secret from other destinations. An achievable secure rate region is found by using random binning at the sources, cooperative jamming from the destinations, and compress-and-forward at the relay. Additionally, a genie aided outer bound on the secure rate region is derived. Comparison of inner and outer bounds are provided.
information theory workshop | 2014
Ahmed A. Zewail; Aylin Yener
This paper considers a Gaussian multiple access channel aided by a relay. Specifically, the relay facilitates communication between multiple sources and a destination to which the sources have no direct link. In this set up, the relay node is considered to be untrusted, i.e., honest but curious, from whom the source messages need to be kept secret. We identify an achievable secrecy rate region utilizing cooperative jamming from the destination, and using compress-and-forward at the relay. Additionally, an outer bound on the secrecy rate region is derived. Numerical results indicate that the outer bound is tight in some cases of interest.
advances in social networks analysis and mining | 2014
Basak Guler; Burak Varan; Kaya Tutuncuoglu; Mohamed S. Nafea; Ahmed A. Zewail; Aylin Yener; Damien Octeau
Online social communities often exhibit complex relationship structures, ranging from close friends to political rivals. As a result, persons are influenced by their friends and foes differently. Network applications can benefit from accompanying these structural differences in propagation schemes. In this paper, we study the optimal influence propagation policies for networks with positive and negative relationship types. We tackle the problem of minimizing the end-to-end propagation cost of influencing a target person in favor of an idea by utilizing the relationship types in the underlying social graph. The propagation cost is incurred by social and physical network dynamics such as frequency of interaction, the strength of friendship and foe ties, propagation delay or the impact factor of the propagating idea. We extend this problem by incorporating the impact of message deterioration and ignorance. We demonstrate our results in both a controlled environment and the Epinions dataset. Our results show that judicious propagation schemes lead to a significant reduction in the average cost and complexity of influence propagation compared to naïve myopic algorithms.
information theory workshop | 2015
Ahmed A. Zewail; Aylin Yener
This paper considers the two-user interference relay channel where each source wishes to communicate to its destination a message that is confidential from the other destination. Furthermore, the relay, that is the enabler of communication, due to the absence of direct links, is untrusted. Thus, the messages from both sources need to be kept secret from the relay as well. We provide an achievable secure rate region for this network. The achievability scheme utilizes structured codes for message transmission, cooperative jamming and scaled compute-and-forward. In particular, the sources use nested lattice codes and stochastic encoding, while the destinations jam using lattice points. The relay decodes two integer combinations of the received lattice points and forwards, using Gaussian codewords, to both destinations. The achievability technique provides the insight that we can utilize the untrusted relay node as an encryption block in a two-hop interference relay channel with confidential messages.
IEEE Journal of Selected Topics in Signal Processing | 2015
Basak Guler; Burak Varan; Kaya Tutuncuoglu; Mohamed S. Nafea; Ahmed A. Zewail; Aylin Yener; Damien Octeau
Online social communities often exhibit complex relationship structures, ranging from close friends to political rivals. As a result, persons are influenced by their friends and foes differently. Future network applications can benefit from integrating these structural differences in propagation schemes through socially aware sensors. In this paper, we introduce a propagation model for such social sensor networks with positive and negative relationship types. We tackle two main scenarios based on this model. The first one is to minimize the end-to-end propagation cost of influencing a target person in favor of an idea by utilizing sensor observations about the relationship types in the underlying social graph. The propagation cost is incurred by social and physical network dynamics such as propagation delay, frequency of interaction, the strength of friendship/foe ties or the impact factor of the propagating idea. We next extend this problem by incorporating the impact of message deterioration and ignorance, and by limiting the number of persons influenced against the idea before reaching the target. Second, we study the propagation problem while minimizing the number of negatively influenced persons on the path, and provide extensions to elaborate on the impact of network parameters. We demonstrate our results in both an artificially created network and the Epinions signed network topology. Our results show that judicious propagation schemes lead to a significant reduction in the average cost and complexity of network propagation compared to naïve myopic algorithms.
asilomar conference on signals, systems and computers | 2016
Ahmed A. Zewail; Aylin Yener
We consider a device-to-device coded caching system, where each user is guaranteed recover its requested file and is simultaneously prevented from recovering any file it did not request. We jointly optimize the cache placement and delivery policies such that a set of end users are able to satisfy their requests while preserving the confidentiality constraints. We develop an upper bound utilizing secret sharing schemes and one-time pad keying as well as a lower bound on the required transmission rate. Numerical results indicate that the gap between the bounds vanishes with increasing memory size.
ieee global conference on signal and information processing | 2014
Basak Guler; Burak Varan; Kaya Tutuncuoglu; Mohamed S. Nafea; Ahmed A. Zewail; Aylin Yener; Damien Octeau
Communication networks are linked to and influenced by human interactions. Socially-aware systems should integrate these complex relationship patterns in the network design. This paper studies the impact of friendship and antagonistic relationships between individuals on optimal network propagation policies. We develop a network propagation model for signed networks, and determine the optimal policies to influence a target node with an opinion while minimizing the total number of persons against it. We also provide extensions to this problem to elaborate on the impact of network parameters, such as minimum-delay propagation, while limiting the number of persons influenced against the idea before reaching the target. We provide numerical evaluations in a synthetic setup as well as the Epinions online social dataset. We demonstrate that propagation schemes with social and influence-centric constraints should take into account the relationship types in network design.
IEEE Transactions on Information Forensics and Security | 2017
Ahmed A. Zewail; Aylin Yener
We consider a two-source two-destination two-hop relay network, where all data communication must be kept secret from the relay node. The model considered is the simplest primitive that embodies a multi-transmitter multi-receiver network that needs to communicate sharing an untrusted relay node. We focus on two scenarios. In the first scenario, each source aims to send two messages to be kept secret from the relay: a common message that should be decoded by both destinations, and a private message that should be decoded by the first destination while kept secret from the second one. We define an achievable rate region by utilizing stochastic encoding at the sources, the Gaussian noise cooperative jamming from the destinations, and compress-and-forward at the relay. In the second scenario, each source aims to send a confidential message to its intended destination, which should be kept secret from the other one as well as the relay. We define an achievable rate region using a combination of nested lattice codes and random binning at the sources, structured cooperative jamming from destinations, and scaled compute-and-forward at the relay. We also derive genie-aided outer bounds on the secrecy rate regions. We present numerical results that demonstrate the performance of the proposed achievable schemes. Overall, this paper provides insights into how to utilize an untrusted relay to communicate to destinations with different levels of security clearance, and how intentional interference is an enabler of communication.