Skip to main content

Showing 1–50 of 55 results for author: Rasmussen, K

  1. arXiv:2407.19616  [pdf, other

    cs.LG cs.AI cs.CL

    TopicTag: Automatic Annotation of NMF Topic Models Using Chain of Thought and Prompt Tuning with LLMs

    Authors: Selma Wanna, Ryan Barron, Nick Solovyev, Maksim E. Eren, Manish Bhattarai, Kim Rasmussen, Boian S. Alexandrov

    Abstract: Topic modeling is a technique for organizing and extracting themes from large collections of unstructured text. Non-negative matrix factorization (NMF) is a common unsupervised approach that decomposes a term frequency-inverse document frequency (TF-IDF) matrix to uncover latent topics and segment the dataset accordingly. While useful for highlighting patterns and clustering documents, NMF does no… ▽ More

    Submitted 28 July, 2024; originally announced July 2024.

    Comments: Accepted to ACM Symposium on Document Engineering 2024 (DocEng 24), 2024

  2. arXiv:2407.12013  [pdf, other

    cs.DL cs.AI cs.CL cs.CV cs.LG

    Dating ancient manuscripts using radiocarbon and AI-based writing style analysis

    Authors: Mladen Popović, Maruf A. Dhali, Lambert Schomaker, Johannes van der Plicht, Kaare Lund Rasmussen, Jacopo La Nasa, Ilaria Degano, Maria Perla Colombini, Eibert Tigchelaar

    Abstract: Determining the chronology of ancient handwritten manuscripts is essential for reconstructing the evolution of ideas. For the Dead Sea Scrolls, this is particularly important. However, there is an almost complete lack of date-bearing manuscripts evenly distributed across the timeline and written in similar scripts available for palaeographic comparison. Here, we present Enoch, a state-of-the-art A… ▽ More

    Submitted 26 June, 2024; originally announced July 2024.

    Comments: 16 pages of main article, 103 pages of supplementary materials, currently under review after having been submitted 20 July 2023

  3. arXiv:2403.16222  [pdf, other

    cs.AI

    Cyber-Security Knowledge Graph Generation by Hierarchical Nonnegative Matrix Factorization

    Authors: Ryan Barron, Maksim E. Eren, Manish Bhattarai, Selma Wanna, Nicholas Solovyev, Kim Rasmussen, Boian S. Alexandrov, Charles Nicholas, Cynthia Matuszek

    Abstract: Much of human knowledge in cybersecurity is encapsulated within the ever-growing volume of scientific papers. As this textual data continues to expand, the importance of document organization methods becomes increasingly crucial for extracting actionable insights hidden within large text datasets. Knowledge Graphs (KGs) serve as a means to store factual information in a structured manner, providin… ▽ More

    Submitted 26 March, 2024; v1 submitted 24 March, 2024; originally announced March 2024.

    Comments: Accepted at IEEE ISDFS

  4. arXiv:2403.02546  [pdf, other

    cs.CR

    Catch'em all: Classification of Rare, Prominent, and Novel Malware Families

    Authors: Maksim E. Eren, Ryan Barron, Manish Bhattarai, Selma Wanna, Nicholas Solovyev, Kim Rasmussen, Boian S. Alexandrov, Charles Nicholas

    Abstract: National security is threatened by malware, which remains one of the most dangerous and costly cyber threats. As of last year, researchers reported 1.3 billion known malware specimens, motivating the use of data-driven machine learning (ML) methods for analysis. However, shortcomings in existing ML approaches hinder their mass adoption. These challenges include detection of novel malware and the a… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

    Comments: Accepted at IEEE 12th International Symposium on Digital Forensics and Security (ISDFS), 2024. arXiv admin note: text overlap with arXiv:2309.01350

  5. arXiv:2310.19634  [pdf, other

    cs.CR

    Iris: Dynamic Privacy Preserving Search in Structured Peer-to-Peer Networks

    Authors: Angeliki Aktypi, Kasper Rasmussen

    Abstract: In structured peer-to-peer networks like Chord, the users manage to retrieve the information they seek by asking other nodes from the network for the information they search. Revealing to other nodes the search target makes structured peer-to-peer networks unsuitable for applications that demand query privacy, i.e., hiding the query's target from the intermediate nodes that take part in the routin… ▽ More

    Submitted 30 October, 2023; originally announced October 2023.

  6. arXiv:2310.03237  [pdf, other

    cs.CR

    Ask for Alice: Online Covert Distress Signal in the Presence of a Strong Adversary

    Authors: Hayyu Imanda, Kasper Rasmussen

    Abstract: In this paper we propose a protocol that can be used to covertly send a distress signal through a seemingly normal webserver, even if the adversary is monitoring both the network and the user's device. This allows a user to call for help even when they are in the same physical space as their adversaries. We model such a scenario by introducing a strong adversary model that captures a high degree o… ▽ More

    Submitted 4 October, 2023; originally announced October 2023.

  7. arXiv:2309.10772  [pdf, other

    cs.IR cs.CL cs.DL cs.LG

    Interactive Distillation of Large Single-Topic Corpora of Scientific Papers

    Authors: Nicholas Solovyev, Ryan Barron, Manish Bhattarai, Maksim E. Eren, Kim O. Rasmussen, Boian S. Alexandrov

    Abstract: Highly specific datasets of scientific literature are important for both research and education. However, it is difficult to build such datasets at scale. A common approach is to build these datasets reductively by applying topic modeling on an established corpus and selecting specific topics. A more robust but time-consuming approach is to build the dataset constructively in which a subject matte… ▽ More

    Submitted 19 September, 2023; originally announced September 2023.

    Comments: Accepted at 2023 IEEE ICMLA conference

  8. arXiv:2309.01350  [pdf, other

    cs.CR cs.LG

    MalwareDNA: Simultaneous Classification of Malware, Malware Families, and Novel Malware

    Authors: Maksim E. Eren, Manish Bhattarai, Kim Rasmussen, Boian S. Alexandrov, Charles Nicholas

    Abstract: Malware is one of the most dangerous and costly cyber threats to national security and a crucial factor in modern cyber-space. However, the adoption of machine learning (ML) based solutions against malware threats has been relatively slow. Shortcomings in the existing ML approaches are likely contributing to this problem. The majority of current ML approaches ignore real-world challenges such as t… ▽ More

    Submitted 4 September, 2023; originally announced September 2023.

    Comments: Accepted at IEEE ISI 2023

  9. arXiv:2309.01077  [pdf, other

    cs.LG cs.CR cs.CV

    Robust Adversarial Defense by Tensor Factorization

    Authors: Manish Bhattarai, Mehmet Cagri Kaymak, Ryan Barron, Ben Nebgen, Kim Rasmussen, Boian Alexandrov

    Abstract: As machine learning techniques become increasingly prevalent in data analysis, the threat of adversarial attacks has surged, necessitating robust defense mechanisms. Among these defenses, methods exploiting low-rank approximations for input data preprocessing and neural network (NN) parameter factorization have shown potential. Our work advances this field further by integrating the tensorization… ▽ More

    Submitted 3 September, 2023; originally announced September 2023.

    Comments: Accepted at 2023 ICMLA Conference

  10. arXiv:2210.01060  [pdf, other

    cs.LG

    Generating Hidden Markov Models from Process Models Through Nonnegative Tensor Factorization

    Authors: Erik Skau, Andrew Hollis, Stephan Eidenbenz, Kim Rasmussen, Boian Alexandrov

    Abstract: Monitoring of industrial processes is a critical capability in industry and in government to ensure reliability of production cycles, quick emergency response, and national security. Process monitoring allows users to gauge the progress of an organization in an industrial process or predict the degradation or aging of machine parts in processes taking place at a remote location. Similar to many da… ▽ More

    Submitted 26 April, 2024; v1 submitted 3 October, 2022; originally announced October 2022.

    Comments: 19 pages, 8 figures, TOMACS

  11. arXiv:2208.09942  [pdf, other

    cs.IR

    SeNMFk-SPLIT: Large Corpora Topic Modeling by Semantic Non-negative Matrix Factorization with Automatic Model Selection

    Authors: Maksim E. Eren, Nick Solovyev, Manish Bhattarai, Kim Rasmussen, Charles Nicholas, Boian S. Alexandrov

    Abstract: As the amount of text data continues to grow, topic modeling is serving an important role in understanding the content hidden by the overwhelming quantity of documents. One popular topic modeling approach is non-negative matrix factorization (NMF), an unsupervised machine learning (ML) method. Recently, Semantic NMF with automatic model selection (SeNMFk) has been proposed as a modification to NMF… ▽ More

    Submitted 21 August, 2022; originally announced August 2022.

    Comments: Accepted at ACM Symposium on Document Engineering 2022 (DocEng 22), 2022

  12. arXiv:2208.00343  [pdf, other

    cs.CR eess.SP

    Electromagnetic Signal Injection Attacks on Differential Signaling

    Authors: Youqian Zhang, Kasper Rasmussen

    Abstract: Differential signaling is a method of data transmission that uses two complementary electrical signals to encode information. This allows a receiver to reject any noise by looking at the difference between the two signals, assuming the noise affects both signals in the same way. Many protocols such as USB, Ethernet, and HDMI use differential signaling to achieve a robust communication channel in a… ▽ More

    Submitted 30 July, 2022; originally announced August 2022.

    Comments: 14 pages, 15 figures

  13. arXiv:2203.07102  [pdf, other

    cs.CR

    Detection of Electromagnetic Signal Injection Attacks on Actuator Systems

    Authors: Youqian Zhang, Kasper Rasmussen

    Abstract: An actuator is a device that converts electricity into another form of energy, typically physical movement. They are absolutely essential for any system that needs to impact or modify the physical world, and are used in millions of systems of all sizes, all over the world, from cars and spacecraft to factory control systems and critical infrastructure. An actuator is a "dumb device" that is entire… ▽ More

    Submitted 14 March, 2022; originally announced March 2022.

  14. arXiv:2201.06362  [pdf, other

    cs.CR

    Silently Disabling ECUs and Enabling Blind Attacks on the CAN Bus

    Authors: Matthew Rogers, Kasper Rasmussen

    Abstract: The CAN Bus is crucial to the efficiency, and safety of modern vehicle infrastructure. Electronic Control Units (ECUs) exchange data across a shared bus, dropping messages whenever errors occur. If an ECU generates enough errors, their transmitter is put in a bus-off state, turning it off. Previous work abuses this process to disable ECUs, but is trivial to detect through the multiple errors trans… ▽ More

    Submitted 17 January, 2022; originally announced January 2022.

    Comments: 12 pages, 6 figures

  15. arXiv:2110.10769  [pdf, other

    cs.CR

    RegGuard: Leveraging CPU Registers for Mitigation of Control- and Data-Oriented Attacks

    Authors: Munir Geden, Kasper Rasmussen

    Abstract: CPU registers are small discrete storage units, used to hold temporary data and instructions within the CPU. Registers are not addressable in the same way memory is, which makes them immune from memory attacks and manipulation by other means. In this paper, we take advantage of this to provide a protection mechanism for critical program data; both active local variables and control objects on the… ▽ More

    Submitted 20 October, 2021; originally announced October 2021.

    Comments: 15 pages with 8 figures

  16. arXiv:2102.13460  [pdf, other

    cs.PL cs.AR

    Open-Source Verification with Chisel and Scala

    Authors: Andrew Dobis, Tjark Petersen, Kasper Juul Hesse Rasmussen, Enrico Tolotto, Hans Jakob Damsgaard, Simon Thye Andersen, Richard Lin, Martin Schoeberl

    Abstract: Performance increase with general-purpose processors has come to a halt. We can no longer depend on Moore's Law to increase computing performance. The only way to achieve higher performance or lower energy consumption is by building domain-specific hardware accelerators. To efficiently design and verify those domain-specific accelerators, we need agile hardware development. One of the main obstacl… ▽ More

    Submitted 26 February, 2021; originally announced February 2021.

  17. Identification of Anomalous Diffusion Sources by Unsupervised Learning

    Authors: Raviteja Vangara, Kim Ø. Rasmussen, Dimiter N. Petsev, Golan Bel, Boian S. Alexandrov

    Abstract: Fractional Brownian motion (fBm) is a ubiquitous diffusion process in which the memory effects of the stochastic transport result in the mean squared particle displacement following a power law, $\langle {Δr}^2 \rangle \sim t^α$, where the diffusion exponent $α$ characterizes whether the transport is subdiffusive, ($α<1$), diffusive ($α= 1$), or superdiffusive, ($α>1$). Due to the abundance of fBm… ▽ More

    Submitted 5 October, 2020; originally announced October 2020.

    Comments: published in physical review research

    Journal ref: Physical Review Research, 2(2), 023248 (2020)

  18. arXiv:2009.11776  [pdf, other

    cs.CR

    BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy

    Authors: Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen, Mathias Payer

    Abstract: The Bluetooth standard specifies two transports: Bluetooth Classic (BT) for high-throughput wireless services and Bluetooth Low Energy (BLE) for very low-power scenarios. BT and BLE have dedicated pairing protocols and devices have to pair over BT and BLE to use both securely. In 2014, the Bluetooth standard (v4.2) addressed this usability issue by introducing Cross-Transport Key Derivation (CTKD)… ▽ More

    Submitted 8 November, 2021; v1 submitted 24 September, 2020; originally announced September 2020.

  19. arXiv:2006.15363  [pdf, other

    stat.ML cs.LG

    $α$ Belief Propagation for Approximate Inference

    Authors: Dong Liu, Minh Thành Vu, Zuxing Li, Lars K. Rasmussen

    Abstract: Belief propagation (BP) algorithm is a widely used message-passing method for inference in graphical models. BP on loop-free graphs converges in linear time. But for graphs with loops, BP's performance is uncertain, and the understanding of its solution is limited. To gain a better understanding of BP in general graphs, we derive an interpretable belief propagation algorithm that is motivated by m… ▽ More

    Submitted 27 June, 2020; originally announced June 2020.

  20. arXiv:2006.09927  [pdf, other

    cs.LG stat.ML

    Region-based Energy Neural Network for Approximate Inference

    Authors: Dong Liu, Ragnar Thobaben, Lars K. Rasmussen

    Abstract: Region-based free energy was originally proposed for generalized belief propagation (GBP) to improve loopy belief propagation (loopy BP). In this paper, we propose a neural network based energy model for inference in general Markov random fields (MRFs), which directly minimizes the region-based free energy defined on region graphs. We term our model Region-based Energy Neural Network (RENN). Unlik… ▽ More

    Submitted 17 June, 2020; originally announced June 2020.

  21. arXiv:2003.01433  [pdf, ps, other

    cs.IT eess.SP

    On Dominant Interference in Random Networks and Communication Reliability

    Authors: Dong Liu, Baptiste Cavarec, Lars K. Rasmussen, Jing Yue

    Abstract: In this paper, we study the characteristics of dominant interference power with directional reception in a random network modelled by a Poisson Point Process. Additionally, the Laplace functional of cumulative interference excluding the $n$ dominant interferers is also derived, which turns out to be a generalization of omni-directional reception and complete accumulative interference. As an applic… ▽ More

    Submitted 3 March, 2020; originally announced March 2020.

    Journal ref: ICC 2019

  22. arXiv:1910.05744  [pdf, ps, other

    cs.LG stat.ML

    Powering Hidden Markov Model by Neural Network based Generative Models

    Authors: Dong Liu, Antoine Honoré, Saikat Chatterjee, Lars K. Rasmussen

    Abstract: Hidden Markov model (HMM) has been successfully used for sequential data modeling problems. In this work, we propose to power the modeling capacity of HMM by bringing in neural network based generative models. The proposed model is termed as GenHMM. In the proposed GenHMM, each HMM hidden state is associated with a neural network based generative model that has tractability of exact likelihood and… ▽ More

    Submitted 24 May, 2020; v1 submitted 13 October, 2019; originally announced October 2019.

    Journal ref: ECAI 2020

  23. arXiv:1908.08906  [pdf, other

    cs.LG stat.ML

    $α$ Belief Propagation as Fully Factorized Approximation

    Authors: Dong Liu, Nima N. Moghadam, Lars K. Rasmussen, Jinliang Huang, Saikat Chatterjee

    Abstract: Belief propagation (BP) can do exact inference in loop-free graphs, but its performance could be poor in graphs with loops, and the understanding of its solution is limited. This work gives an interpretable belief propagation rule that is actually minimization of a localized $α$-divergence. We term this algorithm as $α$ belief propagation ($α$-BP). The performance of $α$-BP is tested in MAP (maxim… ▽ More

    Submitted 23 August, 2019; originally announced August 2019.

    Comments: GlobalSIP 2019

  24. arXiv:1907.13432  [pdf, other

    cs.LG stat.ML

    Neural Network based Explicit Mixture Models and Expectation-maximization based Learning

    Authors: Dong Liu, Minh Thành Vu, Saikat Chatterjee, Lars K. Rasmussen

    Abstract: We propose two neural network based mixture models in this article. The proposed mixture models are explicit in nature. The explicit models have analytical forms with the advantages of computing likelihood and efficiency of generating samples. Computation of likelihood is an important aspect of our models. Expectation-maximization based algorithms are developed for learning parameters of the propo… ▽ More

    Submitted 24 May, 2020; v1 submitted 31 July, 2019; originally announced July 2019.

    Comments: IJCNN 2020

  25. Taxonomy and Challenges of Out-of-Band Signal Injection Attacks and Defenses

    Authors: Ilias Giechaskiel, Kasper Bonne Rasmussen

    Abstract: Recent research has shown that the integrity of sensor measurements can be violated through out-of-band signal injection attacks. These attacks target the conversion process from a physical quantity to an analog property---a process that fundamentally cannot be authenticated. Out-of-band signal injection attacks thus pose previously-unexplored security risks by exploiting hardware imperfections in… ▽ More

    Submitted 16 March, 2020; v1 submitted 21 January, 2019; originally announced January 2019.

    Journal ref: IEEE Communications Surveys & Tutorials (Volume 22, Issue 1, Firstquarter 2020)

  26. A Framework for Evaluating Security in the Presence of Signal Injection Attacks

    Authors: Ilias Giechaskiel, Youqian Zhang, Kasper B. Rasmussen

    Abstract: Sensors are embedded in security-critical applications from medical devices to nuclear power plants, but their outputs can be spoofed through electromagnetic and other types of signals transmitted by attackers at a distance. To address the lack of a unifying framework for evaluating the effects of such transmissions, we introduce a system and threat model for signal injection attacks. We further d… ▽ More

    Submitted 10 November, 2019; v1 submitted 11 January, 2019; originally announced January 2019.

    Comments: This article is the extended technical report version of the paper presented at ESORICS 2019, 24th European Symposium on Research in Computer Security (ESORICS), Luxembourg, Luxembourg, September 2019

  27. Entropy-regularized Optimal Transport Generative Models

    Authors: Dong Liu, Minh Thành Vu, Saikat Chatterjee, Lars K. Rasmussen

    Abstract: We investigate the use of entropy-regularized optimal transport (EOT) cost in developing generative models to learn implicit distributions. Two generative models are proposed. One uses EOT cost directly in an one-shot optimization problem and the other uses EOT cost iteratively in an adversarial game. The proposed generative models show improved performance over contemporary models for image gener… ▽ More

    Submitted 16 November, 2018; originally announced November 2018.

    Journal ref: ICASSP 2019

  28. arXiv:1809.05686  [pdf, ps, other

    cs.CR

    On the Feasibility of Fine-Grained TLS Security Configurations in Web Browsers Based on the Requested Domain Name

    Authors: Eman Salem Alashwali, Kasper Rasmussen

    Abstract: Most modern web browsers today sacrifice optimal TLS security for backward compatibility. They apply coarse-grained TLS configurations that support (by default) legacy versions of the protocol that have known design weaknesses, and weak ciphersuites that provide fewer security guarantees (e.g. non Forward Secrecy), and silently fall back to them if the server selects to. This introduces various ri… ▽ More

    Submitted 15 September, 2018; originally announced September 2018.

  29. arXiv:1809.05681  [pdf, ps, other

    cs.CR

    What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS

    Authors: Eman Salem Alashwali, Kasper Rasmussen

    Abstract: A number of important real-world protocols including the Transport Layer Security (TLS) protocol have the ability to negotiate various security-related choices such as the protocol version and the cryptographic algorithms to be used in a particular session. Furthermore, some insecure application-layer protocols such as the Simple Mail Transfer Protocol (SMTP) negotiate the use of TLS itself on top… ▽ More

    Submitted 26 January, 2019; v1 submitted 15 September, 2018; originally announced September 2018.

    Comments: Updates: In sec 6 (brieft survey) and sec. 8 (discussion): minor changes in describing the "DROWN" attack to make the document compatible with the officially published version by Springer. In the references section: modify the "Howard, J.D. and Longstaff, T.A." reference format

  30. arXiv:1804.00130  [pdf, ps, other

    stat.ML cs.LG

    Locally Convex Sparse Learning over Networks

    Authors: Ahmed Zaki, Saikat Chatterjee, Partha P. Mitra, Lars K. Rasmussen

    Abstract: We consider a distributed learning setup where a sparse signal is estimated over a network. Our main interest is to save communication resource for information exchange over the network and reduce processing time. Each node of the network uses a convex optimization based algorithm that provides a locally optimum solution for that node. The nodes exchange their signal estimates over the network in… ▽ More

    Submitted 31 March, 2018; originally announced April 2018.

  31. arXiv:1802.10022  [pdf, ps, other

    cs.IT

    Golden Angle Modulation: Approaching the AWGN Capacity

    Authors: Peter Larsson, Lars K. Rasmussen, Mikael Skoglund

    Abstract: In this work, targeting, e.g., future generation cellular, microwave-links, or optical fiber systems, we propose a new geometric shaping design for golden angle modulation (GAM) based on a (double) truncated Gaussian input distribution. The design improves the mutual information (MI), and the peak-to-average power ratio, over the full signal-to-noise ratio (SNR) range relative to two key GAM schem… ▽ More

    Submitted 27 February, 2018; originally announced February 2018.

    Comments: Submitted draft paper for review. 5 pages, 6 figures

  32. arXiv:1709.03102  [pdf, ps, other

    cs.IT

    The Golden Quantizer: The Complex Gaussian Random Variable Case

    Authors: Peter Larsson, Lars K. Rasmussen, Mikael Skoglund

    Abstract: The problem of quantizing a circularly-symmetric complex Gaussian random variable is considered. For this purpose, we design two non-uniform quantizers, a high-rate-, and a Lloyd-Max-, quantizer that are both based on the (golden angle) spiral-phyllotaxis packing principle. We find that the proposed schemes have lower mean-square error distortion compared to (non)-uniform polar/rectangular-quantiz… ▽ More

    Submitted 10 September, 2017; originally announced September 2017.

    Comments: 4 pages, 4 figures, submitted for possible publication in IEEE wireless communications letters

  33. arXiv:1612.06809  [pdf, ps, other

    cs.IT

    The Matrix Exponential Distribution - A Tool for Wireless System Performance Analysis

    Authors: Peter Larsson, Lars K. Rasmussen, Mikael Skoglund

    Abstract: In [1], we introduced a new, matrix algebraic, performance analysis framework for wireless systems with fading channels based on the matrix exponential distribution. The main idea was to use the compact, powerful, and easy-to-use, matrix exponential (ME)-distribution for i) modeling the unprocessed channel signal to noise ratio (SNR), ii) exploiting the closure property of the ME-distribution for… ▽ More

    Submitted 20 December, 2016; originally announced December 2016.

  34. Leaky Wires: Information Leakage and Covert Communication Between FPGA Long Wires

    Authors: Ilias Giechaskiel, Kasper B. Rasmussen, Ken Eguro

    Abstract: Field-Programmable Gate Arrays (FPGAs) are integrated circuits that implement reconfigurable hardware. They are used in modern systems, creating specialized, highly-optimized integrated circuits without the need to design and manufacture dedicated chips. As the capacity of FPGAs grows, it is increasingly common for designers to incorporate implementations of algorithms and protocols from a range o… ▽ More

    Submitted 13 March, 2018; v1 submitted 27 November, 2016; originally announced November 2016.

  35. arXiv:1601.07768  [pdf, ps, other

    cs.IT

    Effective Capacity of Retransmission Schemes - A Recurrence Relation Approach

    Authors: Peter Larsson, James Gross, Hussein Al-Zubaidy, Lars K. Rasmussen, Mikael Skoglund

    Abstract: We consider the effective capacity performance measure of persistent- and truncated-retransmission schemes that can involve any combination of multiple transmissions per packet, multiple communication modes, or multiple packet communication. We present a structured unified analytical approach, based on a random walk model and recurrence relation formulation, and give exact effective capacity expre… ▽ More

    Submitted 17 August, 2016; v1 submitted 28 January, 2016; originally announced January 2016.

    Comments: 17 pages, 10 figures, revised/compacted version of the one submitted to Trans. on Comm

  36. arXiv:1511.08745  [pdf, ps, other

    cs.IT

    Cooperative Communication Using Network Coding

    Authors: Nan Li, Lars K. Rasmussen, Ming Xiao

    Abstract: We consider a cognitive radio network scenario where a primary transmitter and a secondary transmitter, respectively, communicate a message to their respective primary receiver and secondary receiver over a packet-based wireless link, using a joint automatic-repeat-request (ARQ) error control scheme. The secondary transmitter assists in the retransmission of the primary message, which improves the… ▽ More

    Submitted 10 December, 2015; v1 submitted 27 November, 2015; originally announced November 2015.

    Comments: 32 pages, 8 figures

  37. On the Transmit Beamforming for MIMO Wiretap Channels: Large-System Analysis

    Authors: Maksym A. Girnyk, Frédéric Gabry, Mikko Vehkaperä, Lars K. Rasmussen, Mikael Skoglund

    Abstract: With the growth of wireless networks, security has become a fundamental issue in wireless communications due to the broadcast nature of these networks. In this work, we consider MIMO wiretap channels in a fast fading environment, for which the overall performance is characterized by the ergodic MIMO secrecy rate. Unfortunately, the direct solution to finding ergodic secrecy rates is prohibitive du… ▽ More

    Submitted 1 November, 2014; originally announced November 2014.

    Comments: Published in Lecture Notes in Computer Science 8317, pp. 90-102, 2014. (Proceedings of International Conference on Information-Theoretic Security (ICITS), Singapore, November 2013)

    Journal ref: Lecture Notes in Computer Science 8317, pp. 90-102, 2014

  38. arXiv:1411.0103  [pdf, ps, other

    cs.IT

    On the Optimal Precoding for MIMO Gaussian Wire-Tap Channels

    Authors: Arash Khabbazibasmenj, Maksym A. Girnyk, Sergiy A. Vorobyov, Mikko Vehkaperä, Lars K. Rasmussen

    Abstract: We consider the problem of finding secrecy rate of a multiple-input multiple-output (MIMO) wire-tap channel. A transmitter, a legitimate receiver, and an eavesdropper are all equipped with multiple antennas. The channel states from the transmitter to the legitimate user and to the eavesdropper are assumed to be known at the transmitter. In this contribution, we address the problem of finding the o… ▽ More

    Submitted 1 November, 2014; originally announced November 2014.

    Comments: Published in Proceedings of the Tenth International Symposium on Wireless Communication Systems (ISWCS 2013), Ilmenau, Germany, August 2013

    Journal ref: In Proc. 10th Int. Symp. Wireless Commun. Syst. (ISWCS), pp. 1-4, 2013

  39. Asymptotic Performance Analysis of a K-Hop Amplify-and-Forward Relay MIMO Channel

    Authors: Maksym A. Girnyk, Mikko Vehkaperä, Lars K. Rasmussen

    Abstract: The present paper studies the asymptotic performance of multi-hop amplify-and-forward relay multiple-antenna communication channels. Each multi-antenna terminal in the network amplifies the received signal, sent by a source, and retransmits it upstream towards a destination. Achievable ergodic rates under both jointly optimal detection and decoding and practical separate decoding schemes for arbit… ▽ More

    Submitted 9 March, 2016; v1 submitted 21 October, 2014; originally announced October 2014.

    Comments: Accepted to IEEE Transactions on Information Theory, March 2016

  40. Buffer-Based Distributed LT Codes

    Authors: Iqbal Hussain, Ming Xiao, Lars K. Rasmussen

    Abstract: We focus on the design of distributed Luby transform (DLT) codes for erasure networks with multiple sources and multiple relays, communicating to a single destination. The erasure-floor performance of DLT codes improves with the maximum degree of the relay-degree distribution. However, for conventional DLT codes, the maximum degree is upper-bounded by the number of sources. An additional constrain… ▽ More

    Submitted 1 October, 2014; originally announced October 2014.

    Comments: 14 pages, 17 figures, submitted

    Journal ref: IEEE Transactions on Communications 2014

  41. arXiv:1410.0190  [pdf, ps, other

    cs.IT

    Rateless Codes for the Multi-Way Relay Channel

    Authors: Iqbal Hussain, Ming Xiao, Lars K. Rasmussen

    Abstract: We consider distributed Luby transform (DLT) codes for efficient packet transmission in a multi-way relay network, where the links are modeled as erasure channels. Density evolution is applied for asymptotic performance analysis, and subsequently used in a linear-programming design framework for optimizing the degree distribution at the relay in terms of overhead. Moreover a buffer is introduced a… ▽ More

    Submitted 1 October, 2014; originally announced October 2014.

    Comments: 4 pages, 03 figures, Accepted in IEEE Wireless Communication Letters

    Journal ref: IEEE Wireless Communication Letters 2014

  42. arXiv:1409.7163  [pdf, ps, other

    cs.IT

    Causal/Predictive Imperfect Channel State Information in Block-Fading Channels

    Authors: Khoa D. Nguyen, Nick Letzepis, Albert Guillen i Fabregas, Lars K. Rasmussen

    Abstract: We consider a multi-input multi-output (MIMO) block-fading channel with a general model for channel state information at the transmitter (CSIT). The model covers systems with causal CSIT, where only CSIT of past fading blocks is available, and predictive CSIT, where CSIT of some future fading blocks is available. The optimal diversity-multiplexing tradeoff (DMT) and rate-diversity tradeoff (RDT) o… ▽ More

    Submitted 25 September, 2014; originally announced September 2014.

    Comments: Extended version of ISIT 2010 paper. 23 pages, 8 figures

  43. Asymptotic Analysis of SU-MIMO Channels With Transmitter Noise and Mismatched Joint Decoding

    Authors: Mikko Vehkaperä, Taneli Riihonen, Maksym A. Girnyk, Emil Björnson, Mérouane Debbah, Lars K. Rasmussen, Risto Wichman

    Abstract: Hardware impairments in radio-frequency components of a wireless system cause unavoidable distortions to transmission that are not captured by the conventional linear channel model. In this paper, a 'binoisy' single-user multiple-input multiple-output (SU-MIMO) relation is considered where the additional distortions are modeled via an additive noise term at the transmit side. Through this extended… ▽ More

    Submitted 22 October, 2014; v1 submitted 19 June, 2014; originally announced June 2014.

    Comments: 16 pages, 7 figures

  44. arXiv:1305.4755  [pdf, ps, other

    cs.IT

    Large-System Analysis of Correlated MIMO Multiple Access Channels with Arbitrary Signaling in the Presence of Interference

    Authors: Maksym A. Girnyk, Mikko Vehkaperä, Lars K. Rasmussen

    Abstract: Presence of multiple antennas on both sides of a communication channel promises significant improvements in system throughput and power efficiency. In effect, a new class of large multiple-input multiple-output (MIMO) communication systems has recently emerged and attracted both scientific and industrial attention. To analyze these systems in realistic scenarios, one has to include such aspects as… ▽ More

    Submitted 26 January, 2014; v1 submitted 21 May, 2013; originally announced May 2013.

    Comments: To appear in IEEE Transactions on Wireless Communications

  45. arXiv:1107.5870  [pdf

    cs.SI cs.DL physics.soc-ph

    Evolutionary Dynamics of Scientific Collaboration Networks: Multi-Levels and Cross-time Analysis

    Authors: Alireza Abbasi, Liaquat Hossain, Shahadat Uddin, Kim J. R. Rasmussen

    Abstract: Several studies exist which use scientific literature for comparing scientific activities (e.g., productivity, and collaboration). In this study, using co-authorship data over the last 40 years, we present the evolutionary dynamics of multi level (i.e., individual, institutional and national) collaboration networks for exploring the emergence of collaborations in the research field of "steel struc… ▽ More

    Submitted 29 July, 2011; originally announced July 2011.

    Comments: Accepted for publication in Scientometrics

  46. arXiv:1006.1162  [pdf, ps, other

    cs.IT

    MIMO ARQ with Multi-bit Feedback: Outage Analysis

    Authors: Khoa D. Nguyen, Lars K. Rasmussen, Albert Guillen i Fabregas, Nick Letzepis

    Abstract: We study the asymptotic outage performance of incremental redundancy automatic repeat request (INR-ARQ) transmission over the multiple-input multiple-output (MIMO) block-fading channels with discrete input constellations. We first show that transmission with random codes using a discrete signal constellation across all transmit antennas achieves the optimal outage diversity given by the Singleton… ▽ More

    Submitted 10 June, 2010; v1 submitted 6 June, 2010; originally announced June 2010.

    Comments: 28 pages, 7 figures; submitted to IEEE Transactions on Information Theory

  47. arXiv:0902.3287  [pdf, ps, other

    cs.IT

    Adaptive Decoding of LDPC Codes with Binary Messages

    Authors: Ingmar Land, Gottfried Lechner, Lars K. Rasmussen

    Abstract: A novel adaptive binary decoding algorithm for LDPC codes is proposed, which reduces the decoding complexity while having a comparable or even better performance than corresponding non-adaptive alternatives. In each iteration the variable node decoders use the binary check node decoders multiple times; each single use is referred to as a sub-iteration. To process the sequences of binary messages… ▽ More

    Submitted 23 April, 2009; v1 submitted 18 February, 2009; originally announced February 2009.

    Comments: 5 pages, 4 figures, to be published at ISIT 2009

  48. arXiv:0802.3611  [pdf, ps, other

    cs.IT

    Power Allocation for Fading Channels with Peak-to-Average Power Constraints

    Authors: Khoa D. Nguyen, Albert Guillen i Fabregas, Lars K. Rasmussen

    Abstract: Power allocation with peak-to-average power ratio constraints is investigated for transmission over Nakagami-m fading channels with arbitrary input distributions. In the case of delay-limited block-fading channels, we find the solution to the minimum outage power allocation scheme with peak-to-average power constraints and arbitrary input distributions, and show that the signal-to-noise ratio ex… ▽ More

    Submitted 25 February, 2008; originally announced February 2008.

    Comments: 26 pages, 6 figures, submitted to IEEE Transaction on Wireless Communication

  49. A Tight Lower Bound to the Outage Probability of Discrete-Input Block-Fading Channels

    Authors: Khoa D. Nguyen, Albert Guillen i Fabregas, Lars K. Rasmussen

    Abstract: In this correspondence, we propose a tight lower bound to the outage probability of discrete-input Nakagami-m block-fading channels. The approach permits an efficient method for numerical evaluation of the bound, providing an additional tool for system design. The optimal rate-diversity trade-off for the Nakagami-m block-fading channel is also derived and a tight upper bound is obtained for the… ▽ More

    Submitted 11 July, 2007; originally announced July 2007.

    Comments: 22 pages, 4 figures. This work has been accepted for IEEE Transactions on Information Theory and has been presented in part at the 2007 IEEE International Symposium on Information Theory, Nice, France, June 2007

  50. arXiv:0706.2033  [pdf, other

    cs.IT

    Power Allocation for Discrete-Input Delay-Limited Fading Channels

    Authors: Khoa D. Nguyen, Albert Guillen i Fabregas, Lars K. Rasmussen

    Abstract: We consider power allocation algorithms for fixed-rate transmission over Nakagami-m non-ergodic block-fading channels with perfect transmitter and receiver channel state information and discrete input signal constellations, under both short- and long-term power constraints. Optimal power allocation schemes are shown to be direct applications of previous results in the literature. We show that th… ▽ More

    Submitted 13 June, 2007; originally announced June 2007.

    Comments: 61 pages, 10 figures, Submitted to IEEE Trans. Inf. Theory