Matthieu R. Bloch

Orcid: 0000-0001-9315-9050

Affiliations:
  • Georgia Institute of Technology, Atlanta, USA


According to our database1, Matthieu R. Bloch authored at least 171 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Secure Integrated Sensing and Communication under Correlated Rayleigh Fading.
IACR Cryptol. ePrint Arch., 2024

Bounds on Covert Capacity in the Sub-Exponential Slotted Asynchronous Regime.
CoRR, 2024

Pilot-Attacks Can Enable Positive-Rate Covert Communications of Wireless Hardware Trojans.
CoRR, 2024

Resource-Efficient Entanglement-Assisted Covert Communications over Bosonic Channels.
Proceedings of the IEEE International Symposium on Information Theory, 2024

A Path Metric Based Construction of Polarization-Adjusted Convolutional Codes.
Proceedings of the IEEE International Symposium on Information Theory, 2024

Nonasymptotic Performance Limits of Low-Latency Secure Integrated Sensing and Communication Systems.
Proceedings of the IEEE International Conference on Acoustics, 2024

Covert Joint Communication and Sensing under Variational Distance Constraint.
Proceedings of the 58th Annual Conference on Information Sciences and Systems, 2024

2023
Optimal Rate-Limited Secret Key Generation From Gaussian Sources Using Lattices.
IEEE Trans. Inf. Theory, August, 2023

Secure Integrated Sensing and Communication.
IEEE J. Sel. Areas Inf. Theory, 2023

Rate and Detection-Error Exponent Tradeoff for Joint Communication and Sensing of Fixed Channel States.
IEEE J. Sel. Areas Inf. Theory, 2023

Covert Online Decision Making: From Sequential Hypothesis Testing to Stochastic Bandits.
CoRR, 2023

Secure Integrated Sensing and Communication for Binary Input Additive White Gaussian Noise Channels.
Proceedings of the 3rd IEEE International Symposium on Joint Communications & Sensing, 2023

Retractable Commitment over Noisy Channels.
Proceedings of the IEEE Information Theory Workshop, 2023

Sequential Joint Communication and Sensing of Fixed Channel States.
Proceedings of the IEEE Information Theory Workshop, 2023

Source Polarization-Adjusted Convolutional Codes.
Proceedings of the IEEE International Symposium on Information Theory, 2023

Distributed Stochastic Bandits with Corrupted and Defective Input Commands.
Proceedings of the IEEE International Symposium on Information Theory, 2023

2022
Keyless Covert Communication via Channel State Information.
IEEE Trans. Inf. Theory, 2022

Private Remote Sources for Secure Multi-Function Computation.
IEEE Trans. Inf. Theory, 2022

A 25-34-GHz Eight-Element MIMO Transmitter for Keyless High Throughput Directionally Secure Communication.
IEEE J. Solid State Circuits, 2022

Secret key generation from Gaussian sources using lattice-based extractors.
IACR Cryptol. ePrint Arch., 2022

Secure Joint Communication and Sensing.
IACR Cryptol. ePrint Arch., 2022

Secure Lossy Function Computation with Multiple Private Remote Source Observations.
IACR Cryptol. ePrint Arch., 2022

Multiple Noisy Private Remote Source Observations for Secure Function Computation.
IACR Cryptol. ePrint Arch., 2022

Rate and Detection Error-Exponent Tradeoffs of Joint Communication and Sensing.
Proceedings of the 2nd IEEE International Symposium on Joint Communications & Sensing, 2022

Joint Quantum Communication and Sensing.
Proceedings of the IEEE Information Theory Workshop, 2022

Covert Communication in the Presence of an Uninformed, Informed, and Coordinated Jammer.
Proceedings of the IEEE International Symposium on Information Theory, 2022

Towards a Characterization of the Covert Capacity of Bosonic Channels under Trace Distance.
Proceedings of the IEEE International Symposium on Information Theory, 2022

Covert Best Arm Identification of Stochastic Bandits.
Proceedings of the IEEE International Symposium on Information Theory, 2022

Commitment over Multiple-Access Channels.
Proceedings of the 58th Annual Allerton Conference on Communication, 2022

Controlled Sensing with Corrupted Commands.
Proceedings of the 58th Annual Allerton Conference on Communication, 2022

2021
State Leakage and Coordination With Causal State Knowledge at the Encoder.
IEEE Trans. Inf. Theory, 2021

Universal Covertness for Discrete Memoryless Sources.
IEEE Trans. Inf. Theory, 2021

Two-Multicast Channel With Confidential Messages.
IEEE Trans. Inf. Forensics Secur., 2021

Covert MIMO Communications Under Variational Distance Constraint.
IEEE Trans. Inf. Forensics Secur., 2021

On Covert Quantum Sensing and the Benefits of Entanglement.
IEEE J. Sel. Areas Inf. Theory, 2021

Editorial.
IEEE J. Sel. Areas Inf. Theory, 2021

Evasive Active Hypothesis Testing.
IEEE J. Sel. Areas Inf. Theory, 2021

An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications.
IEEE J. Sel. Areas Inf. Theory, 2021

Key Assistance, Key Agreement, and Layered Secrecy for Bosonic Broadcast Channels.
Proceedings of the IEEE Information Theory Workshop, 2021

Covert Sequential Hypothesis Testing.
Proceedings of the IEEE Information Theory Workshop, 2021

Covert Communication via Non-Causal Cribbing from a Cooperative Jammer.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Explicit Design of Provably Covert Channel Codes.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Signaling for Covert Quantum Sensing.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Secure Multi-Function Computation with Private Remote Sources.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Covert Authentication Against a Myopic Adversary.
Proceedings of the IEEE International Symposium on Information Theory, 2021

mmWave Beam Steering with Hierarchical Optimal Sampling for Unimodal Bandits.
Proceedings of the ICC 2021, 2021

Estimating High Probability Reachable Sets using Gaussian Processes.
Proceedings of the 2021 60th IEEE Conference on Decision and Control (CDC), 2021

Feedback Coding for Active Learning.
Proceedings of the 24th International Conference on Artificial Intelligence and Statistics, 2021

2020
Covert Capacity of Non-Coherent Rayleigh-Fading Channels.
IEEE Trans. Inf. Theory, 2020

Learning an Adversary's Actions for Secret Communication.
IEEE Trans. Inf. Theory, 2020

Covert and Secret Key Expansion Over Quantum Channels Under Collective Attacks.
IEEE Trans. Inf. Theory, 2020

Multilevel-Coded Pulse-Position Modulation for Covert Communications Over Binary-Input Discrete Memoryless Channels.
IEEE Trans. Inf. Theory, 2020

Cooperative Resolvability and Secrecy in the Cribbing Multiple-Access Channel.
IEEE Trans. Inf. Theory, 2020

Strong Coordination of Signals and Actions Over Noisy Channels With Two-Sided State Information.
IEEE Trans. Inf. Theory, 2020

Covert Secret Key Generation With an Active Warden.
IEEE Trans. Inf. Forensics Secur., 2020

Simultaneous Seismic Sources Separation Based on Matrioshka Orthogonal Matching Pursuit, Application in Oil and Gas Exploration.
IEEE Trans. Geosci. Remote. Sens., 2020

Toward Undetectable Quantum Key Distribution Over Bosonic Channels.
IEEE J. Sel. Areas Inf. Theory, 2020

A Hybrid DC Fault Primary Protection Algorithm for Multi-Terminal HVdc Systems.
CoRR, 2020

Keyless Covert Communication in the Presence of Channel State Information.
Proceedings of the IEEE International Symposium on Information Theory, 2020

Active Covert Sensing.
Proceedings of the IEEE International Symposium on Information Theory, 2020

Resolvability of the Multiple Access Channel with Two-Sided Cooperation.
Proceedings of the IEEE International Symposium on Information Theory, 2020

Multi-Robot Coordination for Estimation and Coverage of Unknown Spatial Fields.
Proceedings of the 2020 IEEE International Conference on Robotics and Automation, 2020

2019
First- and Second-Order Asymptotics in Covert Communication.
IEEE Trans. Inf. Theory, 2019

Covert Communication Over a K-User Multiple-Access Channel.
IEEE Trans. Inf. Theory, 2019

Embedding Covert Information in Broadcast Communications.
IEEE Trans. Inf. Forensics Secur., 2019

Security of Covert Quantum Key Distribution under a Class of Coherent Attacks.
CoRR, 2019

Secrecy Rates for a Channel With Two Senders and Two Receivers.
CoRR, 2019

Keyless Covert Communication in the Presence of Non-causal Channel State Information.
Proceedings of the 2019 IEEE Information Theory Workshop, 2019

Forward Reconciliation for Covert Key Generation.
Proceedings of the 2019 IEEE Information Theory Workshop, 2019

Channel Resolvability with a Full-Duplex Decode-and-Forward Relay.
Proceedings of the 2019 IEEE Information Theory Workshop, 2019

Undetectable Radios: Covert Communication under Spectral Mask Constraints.
Proceedings of the IEEE International Symposium on Information Theory, 2019

In-Band Sensing of the Adversary's Channel for Secure Communication in Wireless Channels.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Steganography Protocols for Quantum Channels.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Codes for Covert Communication over Additive White Gaussian Noise Channels.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Attributes of Generators for Best Finite Blocklength Coset Wiretap Codes over Erasure Channels.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Covert Communication with Unknown Code at the Warden.
Proceedings of the 57th Annual Allerton Conference on Communication, 2019

2018
Strong Coordination Over Multi-Hop Line Networks Using Channel Resolvability Codebooks.
IEEE Trans. Inf. Theory, 2018

Coordination in Distributed Networks via Coded Actions With Application to Power Control.
IEEE Trans. Inf. Theory, 2018

Empirical and Strong Coordination via Soft Covering With Polar Codes.
IEEE Trans. Inf. Theory, 2018

Polar Codes for Covert Communications over Asynchronous Discrete Memoryless Channels.
Entropy, 2018

State Leakage and Coordination of Actions: Core of the Receiver's Knowledge.
CoRR, 2018

A framework for covert and secret key expansion over quantum channels.
CoRR, 2018

Polar codes for empirical coordination over noisy channels with strictly causal encoding.
CoRR, 2018

Multilevel-Coded Pulse-Position Modulation for Covert Communications.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Multiple-Access Channel Resolvability with Cribbing.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Covert Communication over a Physically Degraded Relay Channel with Non-Colluding Wardens.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

On Dual Relationships of Secrecy Codes.
Proceedings of the 56th Annual Allerton Conference on Communication, 2018

Strong Coordination over Noisy Channels with Strictly Causal Encoding.
Proceedings of the 56th Annual Allerton Conference on Communication, 2018

2017
Coding Schemes for Achieving Strong Secrecy at Negligible Cost.
IEEE Trans. Inf. Theory, 2017

Smart Wireless Communication is the Cornerstone of Smart Infrastructures.
CoRR, 2017

Second-Order Asymptotics in Covert Communication.
CoRR, 2017

Error exponent for covert communications over discrete memoryless channels.
Proceedings of the 2017 IEEE Information Theory Workshop, 2017

Covert communication over broadcast channels.
Proceedings of the 2017 IEEE Information Theory Workshop, 2017

Learning adversary's actions for secret communication.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Coordination with clustered common randomness in a three-terminal line network.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Strong coordination of signals and actions over noisy channels.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Optimal covert communications using pulse-position modulation.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Modulation recognition using side information and hybrid learning.
Proceedings of the 2017 IEEE International Symposium on Dynamic Spectrum Access Networks, 2017

Covert secret key generation.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Two-transmitter two-receiver channel with confidential messages.
Proceedings of the 55th Annual Allerton Conference on Communication, 2017

2016
Polar Coding for the Broadcast Channel With Confidential Messages: A Random Binning Analogy.
IEEE Trans. Inf. Theory, 2016

Covert Communication Over Noisy Channels: A Resolvability Perspective.
IEEE Trans. Inf. Theory, 2016

Strong Secrecy in Pairwise Key Agreement over a Generalized Multiple Access Channel.
CoRR, 2016

Polar coding for empirical coordination of signals and actions over noisy channels.
Proceedings of the 2016 IEEE Information Theory Workshop, 2016

Keyless asynchronous covert communication.
Proceedings of the 2016 IEEE Information Theory Workshop, 2016

Lossy compression with near-uniform encoder outputs.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Empirical coordination, state masking and state amplification: Core of the decoder's knowledge.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Second-order asymptotics of covert communications over noisy channels.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Keyless covert communication over Multiple-Access Channels.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Strong coordination over a line when actions are Markovian.
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016

Second order asymptotics for degraded wiretap channels: How good are existing codes?
Proceedings of the 54th Annual Allerton Conference on Communication, 2016

2015
Polar Coding for Secret-Key Generation.
IEEE Trans. Inf. Theory, 2015

Information Spectrum Approach to Strong Converse Theorems for Degraded Wiretap Channels.
IEEE Trans. Inf. Forensics Secur., 2015

Error-Control Coding for Physical-Layer Secrecy.
Proc. IEEE, 2015

Strong coordination over multi-hop line networks.
Proceedings of the 2015 IEEE Information Theory Workshop, 2015

Polar coding for the broadcast channel with confidential messages.
Proceedings of the 2015 IEEE Information Theory Workshop, 2015

Lossless and lossy source compression with near-uniform output: Is common randomness always required?
Proceedings of the IEEE International Symposium on Information Theory, 2015

Polar coding for empirical and strong coordination via distribution approximation.
Proceedings of the IEEE International Symposium on Information Theory, 2015

A channel resolvability perspective on stealth communications.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Using deterministic decisions for low-entropy bits in the encoding and decoding of polar codes.
Proceedings of the 53rd Annual Allerton Conference on Communication, 2015

2014
Separation of Reliability and Secrecy in Rate-Limited Secret-Key Generation.
IEEE Trans. Inf. Theory, 2014

Polar Coding for the Broadcast Channel with Confidential Messages and Constrained Randomization.
CoRR, 2014

Low-complexity channel resolvability codes for the symmetric multiple-access channel.
Proceedings of the 2014 IEEE Information Theory Workshop, 2014

Strong coordination over a three-terminal relay network.
Proceedings of the 2014 IEEE Information Theory Workshop, 2014

Uniform distributed source coding for the multiple access wiretap channel.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Strong Secrecy From Channel Resolvability.
IEEE Trans. Inf. Theory, 2013

Semi-Blind Key-Agreement over MIMO Fading Channels.
IEEE Trans. Commun., 2013

Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security.
IEEE Signal Process. Mag., 2013

Cooperative Security at the Physical Layer: A Summary of Recent Advances.
IEEE Signal Process. Mag., 2013

Exploiting Partial Channel State Information for Secrecy over Wireless Channels.
IEEE J. Sel. Areas Commun., 2013

Low-power Secret-key Agreement over OFDM
CoRR, 2013

Practical Limitations of Secret-Key Generation in Narrowband Wireless Environments.
CoRR, 2013

Experimental aspects of secret key generation in indoor wireless environments.
Proceedings of the 14th IEEE Workshop on Signal Processing Advances in Wireless Communications, 2013

Joint channel intrinsic randomness and channel resolvability.
Proceedings of the 2013 IEEE Information Theory Workshop, 2013

Secret key generation from Gaussian sources using lattice hashing.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Data compression with nearly uniform output.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Strong coordination over a line network.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Secret-key generation with arbitrarily varying eavesdropper's channel.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

2012
Special issue on physical-layer security.
J. Commun. Networks, 2012

Separation of Reliability and Secrecy in Rate-Limited Secret Key-Distillation
CoRR, 2012

LDPC-based coded cooperative jamming codes.
Proceedings of the 2012 IEEE Information Theory Workshop, 2012

One-way rate-limited sequential key-distillation.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

On secure communication with constrained randomization.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Strong coordination with polar codes.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

2011
Wireless Secrecy Regions With Friendly Jamming.
IEEE Trans. Inf. Forensics Secur., 2011

Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes.
IEEE Trans. Inf. Forensics Secur., 2011

Strongly Secure Communications Over the Two-Way Wiretap Channel.
IEEE Trans. Inf. Forensics Secur., 2011

Secrecy from Resolvability
CoRR, 2011

Capacity-based random codes cannot achieve strong secrecy over symmetric wiretap channels.
Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools Communications, 2011

Achieving secrecy: Capacity vs. resolvability.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Physical-Layer Security: From Information Theory to Security Engineering.
Cambridge University Press, ISBN: 9780511977985, 2011

2010
Strong secrecy for erasure wiretap channels.
Proceedings of the 2010 IEEE Information Theory Workshop, 2010

Channel intrinsic randomness.
Proceedings of the IEEE International Symposium on Information Theory, 2010

Friendly Jamming for Wireless Secrecy.
Proceedings of IEEE International Conference on Communications, 2010

2009
Secret Sharing over Fast-Fading MIMO Wiretap Channels.
EURASIP J. Wirel. Commun. Netw., 2009

Secure bits through queues.
Proceedings of the 2009 IEEE Information Theory Workshop, 2009

Channel scrambling for secrecy.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Arbitrary jamming can preclude secure communication.
Proceedings of the 47th Annual Allerton Conference on Communication, 2009

2008
Physical-layer security.
PhD thesis, 2008

Wireless Information-Theoretic Security.
IEEE Trans. Inf. Theory, 2008

Network Security for Client-Server Architecture Using Wiretap Codes.
IEEE Trans. Inf. Forensics Secur., 2008

Confidential messages to a cooperative relay.
Proceedings of the 2008 IEEE Information Theory Workshop, 2008

Strong Secrecy for Wireless Channels (Invited Talk).
Proceedings of the Information Theoretic Security, Third International Conference, 2008

On the secrecy capacity of arbitrary wiretap channels.
Proceedings of the 46th Annual Allerton Conference on Communication, 2008

2007
Constellation Shaping using LDPC Codes.
Proceedings of the IEEE International Symposium on Information Theory, 2007

2006
Wireless Information-Theoretic Security - Part II: Practical Implementation
CoRR, 2006

Wireless Information-Theoretic Security - Part I: Theoretical Aspects
CoRR, 2006

LDPC-based Gaussian key reconciliation.
Proceedings of the 2006 IEEE Information Theory Workshop, 2006

LDPC-based secret key agreement over the Gaussian wiretap channel.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

2005
Efficient Reconciliation of Correlated Continuous Random Variables using LDPC Codes
CoRR, 2005

2004
Integrated Direct-Modulation Based Quantum Cryptography System.
Proceedings of the Optical Networks and Technologies, 2004


  Loading...