Elena Egorova

Orcid: 0000-0002-9242-573X

According to our database1, Elena Egorova authored at least 12 papers between 2015 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Separable Collusion-Secure Multimedia Codes.
Probl. Inf. Transm., 2021

2020
Existence and Construction of Complete Traceability Multimedia Fingerprinting Codes Resistant to Averaging Attack and Adversarial Noise.
Probl. Inf. Transm., 2020

On non-binary traceability set systems.
Des. Codes Cryptogr., 2020

Adversarial multiple access channels and a new model of multimedia fingerprinting coding.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Signature codes for weighted noisy adder channel, multimedia fingerprinting and compressed sensing.
Des. Codes Cryptogr., 2019

New lower bound on the rate of traceability set systems.
Proceedings of the XVI International Symposium "Problems of Redundancy in Information and Control Systems", 2019

Symmetric group testing with noise.
Proceedings of the XVI International Symposium "Problems of Redundancy in Information and Control Systems", 2019

A Construction of Traceability Set Systems with Polynomial Tracing Algorithm.
Proceedings of the IEEE International Symposium on Information Theory, 2019

2017
Analysis of Two Tracing Traitor Schemes via Coding Theory.
Proceedings of the Coding Theory and Applications - 5th International Castle Meeting, 2017

2016
Multimedia fingerprinting codes resistant against colluders and noise.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

Signature codes for the A-channel and collusion-secure multimedia fingerprinting codes.
Proceedings of the IEEE International Symposium on Information Theory, 2016

2015
Binary fingerprinting codes - can we prove that someone is guilty?!
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015


  Loading...