Skip to main content

Showing 1–14 of 14 results for author: Karimi, E

  1. arXiv:2309.07056  [pdf, other

    quant-ph cs.AI cs.LG

    Deep Quantum Graph Dreaming: Deciphering Neural Network Insights into Quantum Experiments

    Authors: Tareq Jaouni, Sören Arlt, Carlos Ruiz-Gonzalez, Ebrahim Karimi, Xuemei Gu, Mario Krenn

    Abstract: Despite their promise to facilitate new scientific discoveries, the opaqueness of neural networks presents a challenge in interpreting the logic behind their findings. Here, we use a eXplainable-AI (XAI) technique called $inception$ or $deep$ $dreaming$, which has been invented in machine learning for computer vision. We use this technique to explore what neural networks learn about quantum optics… ▽ More

    Submitted 4 October, 2023; v1 submitted 13 September, 2023; originally announced September 2023.

    Comments: Modified Figure 2. Fixed minor typos

    Journal ref: Machine Learning: Science and Technology 5, 015029 (2024)

  2. arXiv:2212.04350  [pdf, other

    cs.CR math-ph quant-ph

    Secure communication using low dimensional topological elements

    Authors: Manuel F. Ferrer-Garcia, Avishy Carmi, Alessio D'Errico, Hugo Larocque, Eliahu Cohen, Ebrahim Karimi

    Abstract: Low-dimensional topological objects, such as knots and braids, have become prevalent in multiple areas of physics, such as fluid dynamics, optics, and quantum information processing. Such objects also now play a role in cryptography, where a framed knot can store encoded information using its braid representation for communications purposes. The greater resilience of low-dimensional topological el… ▽ More

    Submitted 7 December, 2022; originally announced December 2022.

    Comments: 5 pages, 4 figures

  3. arXiv:2202.12284  [pdf, ps, other

    cs.IT eess.SP

    Noisy Group Testing with Side Information

    Authors: Esmaeil Karimi, Anoosheh Heidarzadeh, Krishna R. Narayanan, Alex Sprintson

    Abstract: Group testing has recently attracted significant attention from the research community due to its applications in diagnostic virology. An instance of the group testing problem includes a ground set of individuals which includes a small subset of infected individuals. The group testing procedure consists of a number of tests, such that each test indicates whether or not a given subset of individual… ▽ More

    Submitted 24 February, 2022; originally announced February 2022.

  4. arXiv:2111.13826  [pdf, other

    cs.RO cs.CV

    Average Outward Flux Skeletons for Environment Mapping and Topology Matching

    Authors: Morteza Rezanejad, Babak Samari, Elham Karimi, Ioannis Rekleitis, Gregory Dudek, Kaleem Siddiqi

    Abstract: We consider how to directly extract a road map (also known as a topological representation) of an initially-unknown 2-dimensional environment via an online procedure that robustly computes a retraction of its boundaries. In this article, we first present the online construction of a topological map and the implementation of a control law for guiding the robot to the nearest unexplored area, first… ▽ More

    Submitted 27 November, 2021; originally announced November 2021.

  5. arXiv:2110.10110  [pdf, ps, other

    cs.IT

    Scheduling Improves the Performance of Belief Propagation for Noisy Group Testing

    Authors: Esmaeil Karimi, Anoosheh Heidarzadeh, Krishna R. Narayanan, Alex Sprintson

    Abstract: This paper considers the noisy group testing problem where among a large population of items some are defective. The goal is to identify all defective items by testing groups of items, with the minimum possible number of tests. The focus of this work is on the practical settings with a limited number of items rather than the asymptotic regime. In the current literature, belief propagation has been… ▽ More

    Submitted 19 October, 2021; originally announced October 2021.

  6. arXiv:2007.16175  [pdf, other

    cs.CR cs.AR

    Hardware/Software Obfuscation against Timing Side-channel Attack on a GPU

    Authors: Elmira Karimi, Yunsi Fei, David Kaeli

    Abstract: GPUs are increasingly being used in security applications, especially for accelerating encryption/decryption. While GPUs are an attractive platform in terms of performance, the security of these devices raises a number of concerns. One vulnerability is the data-dependent timing information, which can be exploited by adversary to recover the encryption key. Memory system features are frequently exp… ▽ More

    Submitted 31 July, 2020; originally announced July 2020.

    Comments: 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)

  7. arXiv:2001.09146  [pdf, ps, other

    cs.IT

    A Combinatorial View of the Service Rates of Codes Problem, its Equivalence to Fractional Matching and its Connection with Batch Codes

    Authors: Fatemeh Kazemi, Esmaeil Karimi, Emina Soljanin, Alex Sprintson

    Abstract: We propose a novel technique for constructing a graph representation of a code through which we establish a significant connection between the service rate problem and the well-known fractional matching problem. Using this connection, we show that the service capacity of a coded storage system equals the fractional matching number in the graph representation of the code, and thus is lower bounded… ▽ More

    Submitted 24 January, 2020; originally announced January 2020.

  8. arXiv:2001.09049  [pdf, other

    cs.IT

    Increasing the Raw Key Rate in Energy-Time Entanglement Based Quantum Key Distribution

    Authors: Esmaeil Karimi, Emina Soljanin, Philip Whiting

    Abstract: A Quantum Key Distribution (QKD) protocol describes how two remote parties can establish a secret key by communicating over a quantum and a public classical channel that both can be accessed by an eavesdropper. QKD protocols using energy-time entangled photon pairs are of growing practical interest because of their potential to provide a higher secure key rate over long distances by carrying multi… ▽ More

    Submitted 24 January, 2020; originally announced January 2020.

    Comments: 14 pages; 3 figures

  9. arXiv:1910.06845  [pdf, ps, other

    cs.IT

    Non-adaptive Quantitative Group Testing Using Irregular Sparse Graph Codes

    Authors: Esmaeil Karimi, Fatemeh Kazemi, Anoosheh Heidarzadeh, Krishna R. Narayanan, Alex Sprintson

    Abstract: This paper considers the problem of Quantitative Group Testing (QGT) where there are some defective items among a large population of $N$ items. We consider the scenario in which each item is defective with probability $K/N$, independently from the other items. In the QGT problem, the goal is to identify all or a sufficiently large fraction of the defective items by testing groups of items, with t… ▽ More

    Submitted 15 October, 2019; originally announced October 2019.

    Comments: 7 pages; This work was presented at the 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton'19), Monticello, Illinois, USA, Sept 2019

  10. arXiv:1906.11278  [pdf, ps, other

    cs.IT

    Private Information Retrieval with Private Coded Side Information: The Multi-Server Case

    Authors: Fatemeh Kazemi, Esmaeil Karimi, Anoosheh Heidarzadeh, Alex Sprintson

    Abstract: In this paper, we consider the multi-server setting of Private Information Retrieval with Private Coded Side Information (PIR-PCSI) problem. In this problem, there is a database of $K$ messages whose copies are replicated across $N$ servers, and there is a user who knows a random linear combination of a random subset of $M$ messages in the database as side information. The user wishes to download… ▽ More

    Submitted 26 June, 2019; originally announced June 2019.

    Comments: 11 pages

  11. arXiv:1906.09259  [pdf, ps, other

    cs.IT

    Multi-Server Private Information Retrieval with Coded Side Information

    Authors: Fatemeh Kazemi, Esmaeil Karimi, Anoosheh Heidarzadeh, Alex Sprintson

    Abstract: In this paper, we study the multi-server setting of the \emph{Private Information Retrieval with Coded Side Information (PIR-CSI)} problem. In this problem, there are $K$ messages replicated across $N$ servers, and there is a user who wishes to download one message from the servers without revealing any information to any server about the identity of the requested message. The user has a side info… ▽ More

    Submitted 21 June, 2019; originally announced June 2019.

    Comments: 16 pages; A short version of this work was presented at the 16th Canadian Workshop on Information Theory (CWIT'19), Hamilton, Ontario, Canada, June 2019

  12. arXiv:1901.07748  [pdf, ps, other

    cs.IT

    Single-Server Single-Message Online Private Information Retrieval with Side Information

    Authors: Fatemeh Kazemi, Esmaeil Karimi, Anoosheh Heidarzadeh, Alex Sprintson

    Abstract: In many practical settings, the user needs to retrieve information from a server in a periodic manner, over multiple rounds of communication. In this paper, we discuss the setting in which this information needs to be retrieved privately, such that the identity of all the information retrieved until the current round is protected. This setting can occur in practical situations in which the user ne… ▽ More

    Submitted 25 January, 2019; v1 submitted 23 January, 2019; originally announced January 2019.

    Comments: 7 pages; This work is a long version of an article submitted to IEEE for possible publication

  13. arXiv:1901.07635  [pdf, ps, other

    cs.IT

    Sparse Graph Codes for Non-adaptive Quantitative Group Testing

    Authors: Esmaeil Karimi, Fatemeh Kazemi, Anoosheh Heidarzadeh, Krishna R. Narayanan, Alex Sprintson

    Abstract: This paper considers the problem of Quantitative Group Testing (QGT). Consider a set of $N$ items among which $K$ items are defective. The QGT problem is to identify (all or a sufficiently large fraction of) the defective items, where the result of a test reveals the number of defective items in the tested group. In this work, we propose a non-adaptive QGT algorithm using sparse graph codes over b… ▽ More

    Submitted 24 April, 2019; v1 submitted 22 January, 2019; originally announced January 2019.

  14. arXiv:1805.02977  [pdf, ps, other

    cs.IT

    A Simple and Efficient Strategy for the Coin Weighing Problem with a Spring Scale

    Authors: Esmaeil Karimi, Fatemeh Kazemi, Anoosheh Heidarzadeh, Alex Sprintson

    Abstract: This paper considers a generalized version of the coin weighing problem with a spring scale that lies at the intersection of group testing and compressed sensing problems. Given a collection of $n\geq 2$ coins of total weight $d$ (for a known integer $d$), where the weight of each coin is an unknown integer in the range of $\{0,1,\dots,k\}$ (for a known integer $k\geq 1$), the problem is to determ… ▽ More

    Submitted 8 May, 2018; originally announced May 2018.

    Comments: 10 pages, 3 figures; A shorter version will appear in ISIT 2018