Asaf Cohen

Orcid: 0000-0002-9567-5793

Affiliations:
  • Ben-Gurion University, Israel


According to our database1, Asaf Cohen authored at least 93 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Corrections to "Private Information Retrieval Over Gaussian MAC".
IEEE Trans. Inf. Theory, October, 2024

Order-Optimal Multiple-Access Channel for Massive MIMO via Group Testing Decoding.
IEEE Trans. Commun., July, 2024

Secure Adaptive Group Testing.
IEEE Trans. Inf. Forensics Secur., 2024

Covertly Controlling a Linear System.
IEEE Trans. Inf. Forensics Secur., 2024

Correction to "Private Information Retrieval Over Gaussian MAC".
CoRR, 2024

Novel Bounds for Semi-Blind Multiple-Access in Massive MIMO.
Proceedings of the IEEE International Symposium on Information Theory, 2024

An Efficient, High-Rate Scheme for Private Information Retrieval over the Gaussian MAC.
Proceedings of the IEEE International Symposium on Information Theory, 2024

Less than 1-Bit Control of an Unstable AR Process with 1-Bit Quantizers.
Proceedings of the IEEE International Symposium on Information Theory, 2024

2023
Single Instance Self-Masking via Permutations.
IACR Cryptol. ePrint Arch., 2023

Order-Optimal Joint Transmission and Identification in Massive Multi-User MIMO via Group Testing.
Proceedings of the IEEE International Symposium on Information Theory, 2023

Robust Group Testing-Based Multiple-Access Protocol for Massive MIMO.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023

Single Instance Self-masking via Permutations - (Preliminary Version).
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023

2022
Universal Randomized Guessing Subject to Distortion.
IEEE Trans. Inf. Theory, 2022

Perfectly Covert Communication with a Reflective Panel.
CoRR, 2022

Multiple Access Channel in Massive Multi-User MIMO Using Group Testing.
CoRR, 2022

Reinforcement Based User Scheduling for Cellular Communications.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022

2021
Compute-and-Forward in Large Relaying Systems: Limitations and Asymptotically Optimal Scheduling.
IEEE Trans. Inf. Theory, 2021

Private Information Retrieval Over Gaussian MAC.
IEEE Trans. Inf. Theory, 2021

Secure Group Testing.
IEEE Trans. Inf. Forensics Secur., 2021

Multi-Antenna Jamming in Covert Communication.
IEEE Trans. Commun., 2021

On the Outage Probability of Distributed MAC With ZF Detection.
IEEE Trans. Commun., 2021

Universal Randomized Guessing Subjected to Distortion.
CoRR, 2021

2020
Optimal PHY Configuration in Wireless Networks.
IEEE/ACM Trans. Netw., 2020

Efficient Data Collection Over Multiple Access Wireless Sensors Network.
IEEE/ACM Trans. Netw., 2020

Analysis of Different Approaches to Distributed Multiuser MIMO in the 802.11ac.
IEEE Trans. Mob. Comput., 2020

Universal Randomized Guessing With Application to Asynchronous Decentralized Brute-Force Attacks.
IEEE Trans. Inf. Theory, 2020

Centralized vs Decentralized Targeted Brute-Force Attacks: Guessing With Side-Information.
IEEE Trans. Inf. Forensics Secur., 2020

Privacy-Aware Distributed Hypothesis Testing.
Entropy, 2020

Anomaly Detection for Individual Sequences with Applications in Identifying Malicious Tools.
Entropy, 2020

Private Information Retrieval Over Gaussian MAC.
CoRR, 2020

Approximate Gács-Körner Common Information.
Proceedings of the IEEE International Symposium on Information Theory, 2020

2019
Why Botnets Work: Distributed Brute-Force Attacks Need No Synchronization.
IEEE Trans. Inf. Forensics Secur., 2019

Secure Multi-Source Multicast.
IEEE Trans. Commun., 2019

Multi-Antenna Jamming in Covert Communication.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Jamming Strategies in Covert Communication.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019

2018
Traffic Classification Based on Zero-Length Packets.
IEEE Trans. Netw. Serv. Manag., 2018

The Ergodic Capacity of the Multiple Access Channel Under Distributed Scheduling - Order Optimality of Linear Receivers.
IEEE Trans. Inf. Theory, 2018

Performance Analysis of Opportunistic Distributed Scheduling in Multi-User Systems.
IEEE Trans. Commun., 2018

Maximizing Miss Detection for Covert Communication Under Practical Constraints.
Proceedings of the 2018 IEEE Statistical Signal Processing Workshop, 2018

Distributed Hypothesis Testing Under Privacy Constraints.
Proceedings of the IEEE Information Theory Workshop, 2018

Asymptotically Optimal Scheduling for Compute-and-Forward.
Proceedings of the IEEE Information Theory Workshop, 2018

Secure Adaptive Group Testing.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Secured Data Gathering Protocol for IoT Networks.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018

2017
Network Coding Schemes for Data Exchange Networks With Arbitrary Transmission Delays.
IEEE/ACM Trans. Netw., 2017

Lossless Coding of Correlated Sources With Actions.
IEEE Trans. Inf. Theory, 2017

Data Aggregation Over Multiple Access Wireless Sensors Network.
CoRR, 2017

Integer Forcing: Effective SNR Distribution and Practical Block-Based Schemes.
CoRR, 2017

Distributed Scheduling in Time Dependent Environments: Algorithms and Analysis.
CoRR, 2017

SINR diagram with interference cancellation.
Ad Hoc Networks, 2017

An SMDP approach to optimal PHY configuration in wireless networks.
Proceedings of the 13th Annual Conference on Wireless On-demand Network Systems and Services, 2017

The necessity of scheduling in compute-and-forward.
Proceedings of the 2017 IEEE Information Theory Workshop, 2017

Centralized vs decentralized multi-agent guesswork.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Individually-secure multi-source multicast.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

2016
Coded Retransmission in Wireless Networks Via Abstract MDPs: Theory and Algorithms.
IEEE Trans. Wirel. Commun., 2016

Wiretap Channel With Causal State Information and Secure Rate-Limited Feedback.
IEEE Trans. Commun., 2016

Maximum Entropy Functions: Approximate Gacs-Korner for Distributed Compression.
CoRR, 2016

Efficient coding for multi-source networks using Gács-Körner common information.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

On secrecy rates and outage in multi-user multi-eavesdroppers MISO systems.
Proceedings of the IEEE International Symposium on Information Theory, 2016

2015
When physics meets signal processing: Image and video denoising based on Ising theory.
Signal Process. Image Commun., 2015

Network Coding Based Information Spreading in Dynamic Networks With Correlated Data.
IEEE J. Sel. Areas Commun., 2015

Asymptotic Analysis for Reliable Data Dissemination in Shared loss Multicast Trees.
CoRR, 2015

On the Capacity of Wireless Networks with Random Transmission Delay.
CoRR, 2015

Universal Anomaly Detection: Algorithms and Applications.
CoRR, 2015

Capacity and performance analysis for multi-user system under distributed opportunistic scheduling in a time dependent channel.
CoRR, 2015

Scaling laws for reliable data dissemination in shared loss multicast trees.
Proceedings of the 53rd Annual Allerton Conference on Communication, 2015

Performance analysis for multi-user systems under distributed opportunistic scheduling.
Proceedings of the 53rd Annual Allerton Conference on Communication, 2015

2014
Distributed Inter-Cell Interference Mitigation Via Joint Scheduling and Power Control Under Noise Rise Constraints.
IEEE Trans. Wirel. Commun., 2014

Capacity of Distributed Opportunistic Scheduling in Nonhomogeneous Networks.
IEEE Trans. Inf. Theory, 2014

Sensor networks: From dependence analysis via matroid bases to online synthesis.
Theor. Comput. Sci., 2014

Botnet identification via universal anomaly detection.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

Random delay in network coding for bidirectional relaying.
Proceedings of the International Symposium on Network Coding, 2014

The capacity of the Multiple Access Channel under distributed scheduling and MMSE decoding.
Proceedings of the 2014 IEEE Information Theory Workshop, 2014

Lossless coding of correlated sources with actions in acyclic directed networks.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

2013
Electrical Network Frequency (ENF) Maximum-Likelihood Estimation Via a Multitone Harmonic Model.
IEEE Trans. Inf. Forensics Secur., 2013

Efficient and Universal Corruption Resilient Fountain Codes.
IEEE Trans. Commun., 2013

Coded unicast downstream traffic in a wireless network: analysis and WiFi implementation.
EURASIP J. Adv. Signal Process., 2013

MAC capacity under distributed scheduling of multiple users and linear decorrelation.
Proceedings of the 2013 IEEE Information Theory Workshop, 2013

Image restoration via ising theory and automatic noise estimation.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2013

Correlated sources with actions.
Proceedings of the 51st Annual Allerton Conference on Communication, 2013

2012
Opportunistic Scheduling in Heterogeneous Networks: Distributed Algorithms and System Capacity
CoRR, 2012

Network coded gossip with correlated data.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Capacity of distributed opportunistic scheduling in heterogeneous networks.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

2011
Efficient Joint Network-Source Coding for Multiple Terminals with Side Information
CoRR, 2011

Efficient distributed source coding for multiple receivers via matrix sparsification.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Sensor Fusion: From Dependence Analysis via Matroid Bases to Online Synthesis.
Proceedings of the Algorithms for Sensor Systems, 2011

2009
On networks with side information.
Proceedings of the IEEE International Symposium on Information Theory, 2009

2008
Scanning and Sequential Decision Making for Multidimensional Data - Part II: The Noisy Case.
IEEE Trans. Inf. Theory, 2008

2007
Scanning and Sequential Decision Making for Multidimensional Data-Part I: The Noiseless Case.
IEEE Trans. Inf. Theory, 2007

Scanning and Sequential Decision Making for Multi-Dimensional Data - Part II: the Noisy Case
CoRR, 2007

Scanning, Filtering and Prediction for Random Fields Corrupted by Gaussian Noise.
Proceedings of the IEEE International Symposium on Information Theory, 2007

2006
Scanning and Sequential Decision Making for Multi-Dimensional Data - Part I: the Noiseless Case
CoRR, 2006

Universal Scanning and Sequential Decision Making for Multidimensional Data.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

2004
Lower bounds on the error probability of block codes based on improvements on de Caen's inequality.
IEEE Trans. Inf. Theory, 2004


  Loading...