Mehrdad Tahmasbi

Articles
  1. M. Tahmasbi and M. R. Bloch, “On Covert Quantum Sensing and the Benefits of Entanglement,” IEEE Journal on Selected Areas in Information Theory, vol. 2, no. 1, pp. 352–365, Mar. 2021.
  2. M. Tahmasbi and M. R. Bloch, “Covert and secret key expansion over quantum channels under collective attacks,” IEEE Transactions on Information Theory, vol. 66, no. 11, pp. 7113–7131, Nov. 2020.
  3. I. A. Kadampot, M. Tahmasbi, and M. R. Bloch, “Multilevel-Coded Pulse-Position Modulation for Covert Communications over Binary-Input Discrete Memoryless Channels,” IEEE Transactions on Information Theory, vol. 66, no. 10, pp. 6001–6023, Oct. 2020.
  4. M. Tahmasbi and M. R. Bloch, “Steganography Protocols for Quantum Channels,” Journal of Mathematical Physics, vol. 61, no. 8, p. 082201, Aug. 2020.
  5. M. Tahmasbi and M. R. Bloch, “Towards Undetectable Quantum Key Distribution over Bosonic Channels,” IEEE Journal on Selected Areas in Information Theory, vol. 1, no. 2, pp. 585–598, Aug. 2020.
  6. M. Tahmasbi and M. R. Bloch, “Covert Secret Key Generation with an Active Warden,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 1026–1039, Jun. 2020.
  7. M. Tahmasbi, A. Savard, and M. R. Bloch, “Covert Capacity of Non-Coherent Rayleigh-Fading Channels,” IEEE Transactions on Information Theory, vol. 66, no. 4, pp. 1979–2005, Apr. 2020.
  8. M. Tahmasbi, M. R. Bloch, and A. Yener, “Learning an Adversary’s Actions for Secret Communication,” IEEE Transactions on Information Theory, vol. 66, no. 3, pp. 1607–1624, Mar. 2020.
  9. M. Tahmasbi and M. R. Bloch, “Framework for covert and secret key expansion over classical-quantum channels,” Physical Review A, vol. 99, no. 5, p. 052329, May 2019.
  10. M. Tahmasbi and M. R. Bloch, “First and Second Order Asymptotics in Covert Communication,” IEEE Transactions on Information Theory, vol. 65, no. 4, pp. 2190–2212, Apr. 2019.
Conference proceedings
  1. M. Tahmasbi, B. Bash, S. Guha, and M. R. Bloch, “Signaling for Covert Quantum Sensing,” in Proc. of IEEE International Symposium on Information Theory, Jul. 2021, pp. 1041–1045.
  2. M. Tahmasbi and M. R. Bloch, “Active Covert Sensing,” in Proc. of IEEE International Symposium on Information Theory, Los Angeles, CA, Jun. 2020, pp. 840–845.
  3. M. Tahmasbi and M. R. Bloch, “Covert Communication with Unknown Code at the Warden,” in Proc. of Allerton Conference on Communication, Control and Computing, Monticello, IL, Sep. 2019, pp. 1060–1067.
  4. I. A. Kadampot, M. Tahmasbi, and M. R. Bloch, “Forward Reconciliation for Covert Key Generation,” in Proc. of IEEE Information Theory Workshop, Visby, Sweden, Aug. 2019, pp. 1–5.
  5. M. Tahmasbi, M. Bloch, and A. Yener, “In-Band Sensing of the Adversary’s Channel for Secure Communication in Wireless Channels,” in Proc. of IEEE International Symposium on Information Theory, Paris, France, Jul. 2019, pp. 2184–2188.
  6. M. Tahmasbi and M. Bloch, “Steganography Protocols for Quantum Channels,” in Proc. of IEEE International Symposium on Information Theory, Paris, France, Jul. 2019, pp. 2179–2183.
  7. I. A. Kadampot, M. Tahmasbi, and M. R. Bloch, “Codes for Covert Communication over Additive White Gaussian Noise Channels,” in Proc. of IEEE International Symposium on Information Theory, Paris, France, Jul. 2019, pp. 977–981.
  8. I. A. Kadampot, M. Tahmasbi, and M. R. Bloch, “Multilevel-Coded Pulse Position Modulation for Covert Communications,” in Proc. of IEEE International Symposium on Information Theory, Vail, CO, Jun. 2018, pp. 1864–1868.
  9. M. Tahmasbi, M. R. Bloch, and V. F. Tan, “Error exponents covert communications,” in Proc. of IEEE Information Theory Workshop, Kaohsiung, Taiwan, Nov. 2017, pp. 304–308.
  10. M. Tahmasbi and M. R. Bloch, “Covert secret key generation,” in Proc. of IEEE Conference on Communications and Network Security, Workshop on Physical-Layer Methods for Wireless Security, Las Vegas, NV, Oct. 2017, pp. 540–544.
  11. M. Tahmasbi, M. R. Bloch, and A. Yener, “Learning Adversary’s Actions for Secret Communication,” in Proc. of IEEE International Symposium on Information Theory, Aachen, Germany, Jun. 2017, pp. 2713–2717.
  12. M. Tahmasbi and M. R. Bloch, “Second Order Asymptotics for Degraded Wiretap Channels: How Good Are Existing Codes?,” in 54th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sep. 2016, pp. 830–837.
  13. M. Tahmasbi and M. R. Bloch, “Second-Order Asymptotics of Covert Communications over Noisy Channels,” in Proc. of IEEE International Symposium on Information Theory, Barcelona, Spain, Jul. 2016, pp. 2224–2228.