Allison Beemer

Orcid: 0000-0002-1759-5026

According to our database1, Allison Beemer authored at least 25 papers between 2016 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Authenticated partial correction over AV-MACs: toward characterization and coding.
CoRR, 2024

Valid: a Validated Algorithm for Learning in Decentralized Networks with Possible Adversarial Presence.
Proceedings of the IEEE International Symposium on Information Theory, 2024

2023
RELDEC: Reinforcement Learning-Based Decoding of Moderate Length LDPC Codes.
IEEE Trans. Commun., October, 2023

Network Decoding.
IEEE Trans. Inf. Theory, June, 2023

Keyless Authentication for AWGN Channels.
IEEE Trans. Inf. Theory, 2023

Extremal absorbing sets in low-density parity-check codes.
Adv. Math. Commun., 2023

2022
Graph-based codes for hierarchical recovery.
Proceedings of the IEEE International Symposium on Information Theory, 2022

2021
Belief Propagation Decoding of Short Graph-Based Channel Codes via Reinforcement Learning.
IEEE J. Sel. Areas Inf. Theory, 2021

The Curious Case of the Diamond Network.
CoRR, 2021

Decoding of Moderate Length LDPC Codes via Learned Clustered Check Node Scheduling.
Proceedings of the 17th International Symposium on Wireless Communication Systems, 2021

2020
Learning to Decode: Reinforcement Learning for Decoding of Sparse Graph-Based Channel Codes.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Analysis of Absorbing Sets using Cosets and Syndromes.
Proceedings of the IEEE International Symposium on Information Theory, 2020

Learned Scheduling of LDPC Decoders Based on Multi-armed Bandits.
Proceedings of the IEEE International Symposium on Information Theory, 2020

Authentication with Mildly Myopic Adversaries.
Proceedings of the IEEE International Symposium on Information Theory, 2020

Authentication and Partial Message Correction over Adversarial Multiple-Access Channels.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Modular design to transform codes for the wiretap channel of type I into codes for the wiretap channel of type II.
CoRR, 2019

Absorbing sets of codes from finite geometries.
Cryptogr. Commun., 2019

Transforming an arbitrary code for the wiretap channel of type I into a code for the wiretap channel of type II.
Proceedings of the 2019 IEEE Information Theory Workshop, 2019

Structured Coding for Authentication in the Presence of a Malicious Adversary.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Authentication Against a Myopic Adversary.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
Explicit optimal-length locally repairable codes of distance 5.
Proceedings of the 56th Annual Allerton Conference on Communication, 2018

2017
Erasure Correction and Locality of Hypergraph Codes.
Proceedings of the Coding Theory and Applications - 5th International Castle Meeting, 2017

Multidimensional Decoding Networks for Trapping Set Analysis.
Proceedings of the Coding Theory and Applications - 5th International Castle Meeting, 2017

A generalized algebraic approach to optimizing SC-LDPC codes.
Proceedings of the 55th Annual Allerton Conference on Communication, 2017

2016
Avoiding trapping sets in SC-LDPC codes under windowed decoding.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016


  Loading...