Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mehrdad Tahmasbi is active.

Publication


Featured researches published by Mehrdad Tahmasbi.


information theory workshop | 2015

On the capacity achieving probability measures for molecular receivers

Mehrdad Tahmasbi

In this paper, diffusion-based molecular communication with ligand receptor receivers is studied. Information messages are assumed to be encoded via variations of the concentration of molecules. The randomness in the ligand reception process induces uncertainty in the communication; limiting the rate of information decoding. We model the ligand receptor receiver by a set of finite-state Markov channels and study the general capacity of such a receiver. Furthermore, the i.i.d. capacity of the receiver is characterized as a lower bound for the general capacity. It is also proved that a finite support probability measure can achieve the i.i.d. capacity of the receiver. Moreover, a bound on the number of points in the support of the probability measure is obtained.


international symposium on information theory | 2016

Second-order asymptotics of covert communications over noisy channels

Mehrdad Tahmasbi; Matthieu R. Bloch

We consider the problem of covert communication over noisy binary input Discrete Memoryless Channels (DMCs). Covertness is measured with respect to an adversary in terms of the divergence between the channel output distribution induced with and without communication. We characterize the exact second order asymptotics of the number of bits that can be reliably transmitted with a probability of error less than ∈ and a divergence less than δ. The main technical contribution of this paper is a detailed analysis of how to expurgate a random code while maintaining its channel resolvability properties.


allerton conference on communication, control, and computing | 2016

Second order asymptotics for degraded wiretap channels: How good are existing codes?

Mehrdad Tahmasbi; Matthieu R. Bloch

We develop three new results regarding the second-order asymptotics of secure communication over wiretap channels. We first establish the optimal second-order asymptotics for a class of degraded wiretap channels without feedback under an effective secrecy criterion. We then derive the optimal second-order asymptotics for degraded wiretap channels with feedback. We finally develop a new converse bound for channel resolvability with non-capacity achieving distributions, which we use to develop useful converse bounds for asymmetric degraded wiretap channels. Our results are illustrated with several numerical examples, and suggest that known coding techniques already achieve their best performance.


international symposium on information theory | 2017

Learning adversary's actions for secret communication

Mehrdad Tahmasbi; Matthieu R. Bloch; Aylin Yener

We analyze the problem of secure communication over a wiretap channel with an active adversary, in which the legitimate transmitter has the opportunity to sense and learn the adversarys actions. Specifically, the adversary has the ability to switch between two channels and to observe the corresponding output at every channel use; the encoder, however, has causal access to observations impacted by adversarys actions. We develop a joint learning/transmission scheme in which the legitimate users learn and adapt to the adversarys actions. For some channel models, we show that the achievable rates, which we define precisely, are arbitrarily close to those obtained with hindsight, had the transmitter known the actions ahead of time. This suggests that there is much to exploit and gain in physical-layer security by monitoring the environment.


ieee international symposium on dynamic spectrum access networks | 2017

Modulation recognition using side information and hybrid learning

Keerthi Suria Kumar Arumugam; Ishaque Ashar Kadampot; Mehrdad Tahmasbi; Shaswat Shah; Matthieu R. Bloch; Sebastian Pokutta

Recent applications of machine learning to modulation recognition have demonstrated the potential of deep learning to achieve state-of-the-art performance. We propose to further extend this approach by using flexible time-space decompositions that are more in line with the actual learning task, as well as integrate side-information, such as higher order moments, directly into the training process. Our promising preliminary results suggest that there are many more benefits to be reaped from such approaches.


arXiv: Information Theory | 2017

Second-Order Asymptotics in Covert Communication.

Mehrdad Tahmasbi; Matthieu R. Bloch


international symposium on information theory | 2018

Multilevel-Coded Pulse-Position Modulation for Covert Communications

Ishaque Ashar Kadampot; Mehrdad Tahmasbi; Matthieu R. Bloch


information theory workshop | 2017

Error exponent for covert communications over discrete memoryless channels

Mehrdad Tahmasbi; Matthieu R. Bloch; Vincent Y. F. Tan


arXiv: Information Theory | 2018

First and Second Order Asymptotics in Covert Communication.

Mehrdad Tahmasbi; Matthieu R. Bloch


arXiv: Information Theory | 2018

Covert Capacity of Non-Coherent Rayleigh-Fading Channels.

Mehrdad Tahmasbi; Anne Savard; Matthieu R. Bloch

Collaboration


Dive into the Mehrdad Tahmasbi's collaboration.

Top Co-Authors

Avatar

Matthieu R. Bloch

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Ishaque Ashar Kadampot

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Aylin Yener

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sebastian Pokutta

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Shaswat Shah

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Vincent Y. F. Tan

National University of Singapore

View shared research outputs
Researchain Logo
Decentralizing Knowledge