Publication | Date of Publication | Type |
---|
Universal Covertness for Discrete Memoryless Sources | 2021-09-07 | Paper |
Learning an Adversary’s Actions for Secret Communication | 2020-09-29 | Paper |
Benefits of Cache Assignment on Degraded Broadcast Channels | 2020-01-28 | Paper |
Non-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Save-and-Transmit and Best-Effort | 2020-01-28 | Paper |
Strongly Secure Multiuser Communication and Authentication With Anonymity Constraints | 2020-01-28 | Paper |
Generalizing Multiple Access Wiretap and Wiretap II Channel Models: Achievable Rates and Cost of Strong Secrecy | 2019-07-19 | Paper |
Secret-Key Generation in Many-to-One Networks: An Integrated Game-Theoretic and Information-Theoretic Approach | 2019-07-19 | Paper |
Polar Coding for the Multiple Access Wiretap Channel via Rate-Splitting and Cooperative Jamming | 2018-12-18 | Paper |
Subset Source Coding | 2018-09-19 | Paper |
Lossy Coding of Correlated Sources Over a Multiple Access Channel: Necessary Conditions and Separation Results | 2018-09-19 | Paper |
Secure Degrees of Freedom for the MIMO Wire-Tap Channel With a Multi-Antenna Cooperative Jammer | 2018-06-27 | Paper |
A New Wiretap Channel Model and Its Strong Secrecy Capacity | 2018-06-27 | Paper |
MIMO-CDMA systems: signature and beamformer design with various levels of feedback | 2017-10-30 | Paper |
The Binary Energy Harvesting Channel With a Unit-Sized Battery | 2017-09-21 | Paper |
Transceiver Optimization forMultiuser MIMO Systems | 2017-09-08 | Paper |
The Gaussian Many-to-One Interference Channel With Confidential Messages | 2017-07-27 | Paper |
The Gaussian Interference Relay Channel: Improved Achievable Rates and Sum Rate Upperbounds Using a Potent Relay | 2017-07-27 | Paper |
Correction to: “The Gaussian Multiple Access Wire-Tap Channel” and “The General Gaussian Multiple Access and Two-Way Wire-Tap Channels: Achievable Rates and Cooperative Jamming” [Dec 08 5747-5755 and Jun 08 2735-2751] | 2017-07-27 | Paper |
Cooperation With an Untrusted Relay: A Secrecy Perspective | 2017-07-27 | Paper |
Multiple Access Channels With States Causally Known at Transmitters | 2017-06-08 | Paper |
The Multiway Relay Channel | 2017-06-08 | Paper |
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay | 2017-06-08 | Paper |
Symmetric Capacity of the Gaussian Interference Channel With an Out-of-Band Relay to Within 1.15 Bits | 2017-06-08 | Paper |
The Role of Feedback in Two-Way Secure Communications | 2017-06-08 | Paper |
Degraded Broadcast Diamond Channels With Noncausal State Information at the Source | 2017-06-08 | Paper |
MIMO Multiple Access Channel With an Arbitrarily Varying Eavesdropper: Secrecy Degrees of Freedom | 2017-06-08 | Paper |
Guiding Blind Transmitters: Degrees of Freedom Optimal Interference Alignment Using Relays | 2017-06-08 | Paper |
MIMO Wiretap Channels With Unknown and Varying Eavesdropper Channel States | 2017-05-16 | Paper |
Degrees of Freedom for the MIMO Multi-Way Relay Channel | 2017-05-16 | Paper |
Providing Secrecy With Structured Codes: Two-User Gaussian Channels | 2017-05-16 | Paper |
Relaying for Multiuser Networks in the Absence of Codebook Information | 2017-04-28 | Paper |
Spectrum Sensing in Cognitive Radio Networks: Performance Evaluation and Optimization | 2012-01-09 | Paper |
The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming | 2009-02-24 | Paper |
The Gaussian Multiple Access Wire-Tap Channel | 2009-02-24 | Paper |
Time-slotted multiuser MIMO systems: beamforming and scheduling strategies | 2005-10-28 | Paper |
Noncoherent multiuser communications: multistage detection and selective filtering | 2005-05-03 | Paper |
Interference management for CDMA systems through power control, multiuser detection, and beamforming | 2003-06-19 | Paper |