scispace - formally typeset
Search or ask a question

Showing papers by "Manar Mohaisen published in 2015"


Journal ArticleDOI
TL;DR: An evaluation of both AutoMal and MaLabel based on medium-scale and large-scale datasets shows AMAL's effectiveness in accurately characterizing, classifying, and grouping malware samples, and several benchmarks, cost estimates and measurements highlight the merits of AMAL.

177 citations


Journal ArticleDOI
TL;DR: This paper reviews several fixed-complexity vector perturbation techniques and investigates their performance under both perfect and imperfect channel knowledge at the transmitter, and investigates the combination of block diagonalization with Vector Perturbation and its merits.
Abstract: Recently, there has been an increasing demand of high data rates services, where several multiuser multipleinput multiple-output (MU-MIMO) techniques were introduced to meet these demands. Among these techniques, vector perturbation combined with linear precoding techniques, such as zero-forcing and minimum mean-square error, have been proven to be efficient in reducing the transmit power and hence, perform close to the optimum algorithm. In this paper, we review several fixed-complexity vector perturbation techniques and investigate their performance under both perfect and imperfect channel knowledge at the transmitter. Also, we investigate the combination of block diagonalization with vector perturbation outline its merits.

4 citations


Journal ArticleDOI
TL;DR: This paper considers each of the two two-antenna receivers as an eavesdropper with 1 or 2 additional eavesdropping antennas and proposes an interleaved multiple rotation-based transformation scheme that neutralizes any a priori knowledge about the structure of the eavesdropped information and rotates the transmitted symbols using orthogonal matrices, preserving both the power and the distance between symbols.
Abstract: Interference alignment (IA) is a technique used to reduce the dimension of the interference, where consequently the multiplexing rate is increased In the 2-user X channel, combining IA with space-time block codes increases the diversity gain These gains are achieved with the cost of leaked information at unintended receivers, where this leaked information can be used to decode other receiver’s signals In this paper, we consider each of the two two-antenna receivers as an eavesdropper with 1 or 2 additional eavesdropping antennas As such, we suggest receiver structures to answer the question: “Is the leaked information sufficient to properly decode the unintended signals?” besides quantifying the leaked information in terms of secrecy sum rates (SSR) Interestingly, we show that the SSR is negative, indicating that the quality of the eavesdropped signals is superior to that of the intended signals To assure confidentiality, we propose an interleaved multiple rotation-based transformation scheme that neutralizes any a priori knowledge about the structure of the eavesdropped information and rotates the transmitted symbols using orthogonal matrices, preserving both the power and the distance between symbols

1 citations


Journal ArticleDOI
TL;DR: In this paper, the authors discuss the effect of noise levels on the quality of the audio quality of a broadcast and propose a method to reduce the noise level of the broadcast signal.
Abstract: 본 논문에서는 각 단말에 2개 이상의 안테나의 간섭 정렬을 이용한 X채널에서 직교 및 준직교 시공간 블록 부호를 통하여 더 높은 다이버시티와 전력 이득을 달성하고자 했다. 제안한 방법으로 다이버시티 차수는 직교 시공간 블록부호에서 최대에 도달한 반면, 준직교 시공간 블록 부호에서는 유효 채널 행렬의 비 직교성에 의해 약간의 성능 저하가 나타났다. 수신기의 유효 채널 행렬에서의 유리한 구조에 의해 단순 제로 포싱 수신기는 최대 다이버시티 차수를 달성하는 반면, 간섭 제거 수신기는 성능이 저하되었다. 기존의 방법과 비교했을 때, 시뮬레이션 결과는 제안된 방법이 같은 스펙트럼 효율을 얻으면서, 3-4개의 안테나의 각 단의 직교 시공간 블록 부호의 경우 각각 목표 비트 에러율 10 -4 에서 14dB와 16.5bB의 이득을 얻는 것을 증명하였다. 또한 4개의 안테나의 각 단의 준직교 시공간 블록 부호의 경우 같은 목표 비트 에러율에서 10dB의 이득을 얻었다.

1 citations


01 Aug 2015
TL;DR: In DJSON, Domain Name System messages are sent and received with a properly formatted HTML using a JSON encoding that allows bidirectional mapping to and from traditional domain Name System transport encodings, guaranteeing that interoperability is no worse than it is today.
Abstract: In this paper we introduce a system, called DJSON, which enables HTTP transport of Domain Name System traffic. DJSON enables re-encoding of the existing Domain Name System message format, so that it can traverse hostile territory with confidence without modifying the underlying Domain Name System design. In DJSON, Domain Name System messages are sent and received with a properly formatted HTML using a JSON encoding that allows bidirectional mapping to and from traditional Domain Name System transport encodings. This guarantees that interoperability is no worse than it is today. HTTP can be used to work around the problem where middle boxes have interoperability problems. DJSON aims to solve several real-world and operational problems. DJSON is designed to “bridge” Domain Name System across areas where Domain Name System packets might be mangled, deliberately modified or blocked. DJSON further aims to enable and address improved reliability, availability, and security. Detailed discussions, experiments run on a prototype of DJSON, and analysis show the effectiveness and relevance of our work.