Mehrdad Tahmasbi

Articles
  1. M. Tahmasbi and M. R. Bloch, “On Covert Quantum Sensing and the Benefits of Entanglement,” IEEE Journal on Selected Areas in Information Theory, vol. 2, no. 1, pp. 352–365, Mar. 2021.
  2. M. Tahmasbi and M. R. Bloch, “Covert and secret key expansion over quantum channels under collective attacks,” ieee_j_it, vol. 66, no. 11, pp. 7113–7131, Nov. 2020.
  3. I. A. Kadampot, M. Tahmasbi, and M. R. Bloch, “Multilevel-Coded Pulse-Position Modulation for Covert Communications over Binary-Input Discrete Memoryless Channels,” ieee_j_it, vol. 66, no. 10, pp. 6001–6023, Oct. 2020.
  4. M. Tahmasbi and M. R. Bloch, “Steganography Protocols for Quantum Channels,” Journal of Mathematical Physics, vol. 61, no. 8, p. 082201, Aug. 2020.
  5. M. Tahmasbi and M. R. Bloch, “Towards Undetectable Quantum Key Distribution over Bosonic Channels,” IEEE Journal on Selected Areas in Information Theory, vol. 1, no. 2, pp. 585–598, Aug. 2020.
  6. M. Tahmasbi and M. R. Bloch, “Covert Secret Key Generation with an Active Warden,” ieee_j_ifs, vol. 15, pp. 1026–1039, Jun. 2020.
  7. M. Tahmasbi, A. Savard, and M. R. Bloch, “Covert Capacity of Non-Coherent Rayleigh-Fading Channels,” ieee_j_it, vol. 66, no. 4, pp. 1979–2005, Apr. 2020.
  8. M. Tahmasbi, M. R. Bloch, and A. Yener, “Learning an Adversary’s Actions for Secret Communication,” ieee_j_it, vol. 66, no. 3, pp. 1607–1624, Mar. 2020.
  9. M. Tahmasbi and M. R. Bloch, “Framework for covert and secret key expansion over classical-quantum channels,” Physical Review A, vol. 99, no. 5, p. 052329, May 2019.
  10. M. Tahmasbi and M. R. Bloch, “First and Second Order Asymptotics in Covert Communication,” ieee_j_it, vol. 65, no. 4, pp. 2190–2212, Apr. 2019.
Conference proceedings
  1. M. Tahmasbi, B. Bash, S. Guha, and M. R. Bloch, “Signaling for Covert Quantum Sensing,” in ieee_isit, Jul. 2021, pp. 1041–1045.
  2. M. Tahmasbi and M. R. Bloch, “Active Covert Sensing,” in ieee_isit, Los Angeles, CA, Jun. 2020, pp. 840–845.
  3. M. Tahmasbi and M. R. Bloch, “Covert Communication with Unknown Code at the Warden,” in Proc. of Allerton Conference on Communication, Control and Computing, Monticello, IL, Sep. 2019, pp. 1060–1067.
  4. I. A. Kadampot, M. Tahmasbi, and M. R. Bloch, “Forward Reconciliation for Covert Key Generation,” in ieee_itw, Visby, Sweden, Aug. 2019, pp. 1–5.
  5. M. Tahmasbi, M. Bloch, and A. Yener, “In-Band Sensing of the Adversary’s Channel for Secure Communication in Wireless Channels,” in ieee_isit, Paris, France, Jul. 2019, pp. 2184–2188.
  6. M. Tahmasbi and M. Bloch, “Steganography Protocols for Quantum Channels,” in ieee_isit, Paris, France, Jul. 2019, pp. 2179–2183.
  7. I. A. Kadampot, M. Tahmasbi, and M. R. Bloch, “Codes for Covert Communication over Additive White Gaussian Noise Channels,” in ieee_isit, Paris, France, Jul. 2019, pp. 977–981.
  8. I. A. Kadampot, M. Tahmasbi, and M. R. Bloch, “Multilevel-Coded Pulse Position Modulation for Covert Communications,” in ieee_isit, Vail, CO, Jun. 2018, pp. 1864–1868.
  9. M. Tahmasbi, M. R. Bloch, and V. F. Tan, “Error exponents covert communications,” in ieee_itw, Kaohsiung, Taiwan, Nov. 2017, pp. 304–308.
  10. M. Tahmasbi and M. R. Bloch, “Covert secret key generation,” in Proc. of IEEE Conference on Communications and Network Security, Workshop on Physical-Layer Methods for Wireless Security, Las Vegas, NV, Oct. 2017, pp. 540–544.
  11. M. Tahmasbi, M. R. Bloch, and A. Yener, “Learning Adversary’s Actions for Secret Communication,” in ieee_isit, Aachen, Germany, Jun. 2017, pp. 2713–2717.
  12. M. Tahmasbi and M. R. Bloch, “Second Order Asymptotics for Degraded Wiretap Channels: How Good Are Existing Codes?,” in 54th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sep. 2016, pp. 830–837.
  13. M. Tahmasbi and M. R. Bloch, “Second-Order Asymptotics of Covert Communications over Noisy Channels,” in ieee_isit, Barcelona, Spain, Jul. 2016, pp. 2224–2228.