no code implementations • 28 Mar 2024 • Ahmad Ghasemi, Hossein Pishro-Nik
We evaluate the performance of the proposed LR-MPGNN model based on several key metrics: model size, number of parameters, weighted sum rate of the communication system, and the distribution of eigenvalues of weight matrices.
no code implementations • 29 Nov 2022 • Mohammadjavad Khosravi, Rushiv Arora, Saeede Enayati, Hossein Pishro-Nik
In order to obtain the shortest path to the target, a general framework is provided to model the problem of target detection when the target's location is probabilistically known.
no code implementations • 30 Sep 2017 • Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik
Here we derive the fundamental limits of user privacy when both anonymization and obfuscation-based protection mechanisms are applied to users' time series of data.
Information Theory Cryptography and Security Information Theory