Rafael F. Schaefer

Orcid: 0000-0002-1702-9075

Affiliations:
  • TU Berlin, Department of Telecommunication Systems, Germany
  • Princeton University, Department of Electrical Engineering, NJ, USA
  • TU Munich, Department of Electrical and Computer Engineering


According to our database1, Rafael F. Schaefer authored at least 227 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
On the Need of Neuromorphic Twins to Detect Denial-of-Service Attacks on Communication Networks.
IEEE/ACM Trans. Netw., August, 2024

Capacity of Finite State Channels With Feedback: Algorithmic and Optimization Theoretic Properties.
IEEE Trans. Inf. Theory, August, 2024

Characterization of the Complexity of Computing the Capacity of Colored Gaussian Noise Channels.
IEEE Trans. Commun., August, 2024

Reliability and Latency Analysis for Wireless Communication Systems With a Secret-Key Budget.
IEEE Trans. Commun., 2024

Secure Integrated Sensing and Communication under Correlated Rayleigh Fading.
IACR Cryptol. ePrint Arch., 2024

Deep Learning-based Codes for Wiretap Fading Channels.
CoRR, 2024

Building Resilience in Wireless Communication Systems With a Secret-Key Budget.
CoRR, 2024

Finite Blocklength Performance of Capacity-achieving Codes in the Light of Complexity Theory.
CoRR, 2024

Integrated Sensing and Communications for Unsourced Random Access: Fundamental Limits.
CoRR, 2024

Secret Key Generation Rates for Line of Sight Multipath Channels in the Presence of Eavesdroppers.
Proceedings of the 27th International Workshop on Smart Antennas, 2024

Optimized Random Antenna Switching for Channel Measurement Based Secret Key Generation : Invited Paper.
Proceedings of the 25th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2024

On the Non-Computability of Convex Optimization Problems.
Proceedings of the IEEE International Symposium on Information Theory, 2024

Short-Length Code Designs for Integrated Sensing and Communications Using Deep Learning.
Proceedings of the IEEE International Conference on Communications, 2024

Robust Generation of Channel Distributions with Diffusion Models.
Proceedings of the IEEE International Conference on Communications, 2024

Characterization of the Complexity of Computing the Capacity of Colored Noise Gaussian Channels.
Proceedings of the IEEE International Conference on Communications, 2024

On the Solvability of Resource Allocation Problems for Wireless Systems on Digital Computers.
Proceedings of the IEEE International Conference on Communications, 2024

Reliability and Latency of Wireless Communication Systems with a Secret-Key Budget.
Proceedings of the IEEE International Conference on Communications, 2024

Nonasymptotic Performance Limits of Low-Latency Secure Integrated Sensing and Communication Systems.
Proceedings of the IEEE International Conference on Acoustics, 2024

2023
Virtual-Twin Technologies in Networking.
IEEE Commun. Mag., November, 2023

Algorithmic Computability and Approximability of Capacity-Achieving Input Distributions.
IEEE Trans. Inf. Theory, September, 2023

Channel Hardening of IRS-Aided Multi-Antenna Systems: How Should IRSs Scale?
IEEE J. Sel. Areas Commun., August, 2023

Quality of Security Guarantees for and with Physical Unclonable Functions and Biometric Secrecy Systems.
Entropy, August, 2023

Trade Reliability for Security: Leakage-Failure Probability Minimization for Machine-Type Communications in URLLC.
IEEE J. Sel. Areas Commun., July, 2023

Information Theoretic Methods for Future Communication Systems.
Entropy, March, 2023

Secure and Private Distributed Source Coding With Private Keys and Decoder Side Information.
IEEE Trans. Inf. Forensics Secur., 2023

Secure Integrated Sensing and Communication.
IEEE J. Sel. Areas Inf. Theory, 2023

Learning End-to-End Channel Coding with Diffusion Models.
CoRR, 2023

Generalized Rainbow Differential Privacy.
CoRR, 2023

Algorithmic Computability of the Capacity of Gaussian Channels with Colored Noise.
CoRR, 2023

A Secure and Resilient 6G Architecture Vision of the German Flagship Project 6G-ANNA.
IEEE Access, 2023

Concatenated Classic and Neural (CCN) Codes: ConcatenatedAE.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023

Secure Integrated Sensing and Communication for Binary Input Additive White Gaussian Noise Channels.
Proceedings of the 3rd IEEE International Symposium on Joint Communications & Sensing, 2023

How to Trade Reliability for Security in Machine-Type Communications: Leakage-Failure Probability Minimization.
Proceedings of the IEEE International Conference on Communications, 2023

Algorithmic Computability of the Capacity of Additive Colored Gaussian Noise Channels.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Private Key and Decoder Side Information for Secure and Private Source Coding.
Entropy, December, 2022

Private Remote Sources for Secure Multi-Function Computation.
IEEE Trans. Inf. Theory, 2022

Secure Active and Passive Beamforming in IRS-Aided MIMO Systems.
IEEE Trans. Inf. Forensics Secur., 2022

Privacy, Secrecy, and Storage With Nested Randomized Polar Subcode Constructions.
IEEE Trans. Commun., 2022

Code Constructions and Bounds for Identification via Channels.
IEEE Trans. Commun., 2022

Turing Meets Shannon: On the Algorithmic Construction of Channel-Aware Codes.
IEEE Trans. Commun., 2022

Rainbow Differential Privacy.
IACR Cryptol. ePrint Arch., 2022

Secure and Private Source Coding with Private Key and Decoder Side Information.
IACR Cryptol. ePrint Arch., 2022

Secure Joint Communication and Sensing.
IACR Cryptol. ePrint Arch., 2022

Secure Lossy Function Computation with Multiple Private Remote Source Observations.
IACR Cryptol. ePrint Arch., 2022

Multiple Noisy Private Remote Source Observations for Secure Function Computation.
IACR Cryptol. ePrint Arch., 2022

Capacity-Achieving Input Distributions: Algorithmic Computability and Approximability.
Proceedings of the IEEE International Symposium on Information Theory, 2022

How Should IRSs Scale to Harden Multi-Antenna Channels?
Proceedings of the 12th IEEE Sensor Array and Multichannel Signal Processing Workshop, 2022

Trustworthiness Verification and Integrity Testing for Wireless Communication Systems.
Proceedings of the IEEE International Conference on Communications, 2022

Effects of Quantization on Federated Learning with Local Differential Privacy.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Securing Massive MIMO Systems: Secrecy for Free With Low-Complexity Architectures.
IEEE Trans. Wirel. Commun., 2021

On the Algorithmic Solvability of Channel Dependent Classification Problems in Communication Systems.
IEEE/ACM Trans. Netw., 2021

Editorial.
IEEE J. Sel. Areas Inf. Theory, 2021

Controllable Key Agreement With Correlated Noise.
IEEE J. Sel. Areas Inf. Theory, 2021

An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications.
IEEE J. Sel. Areas Inf. Theory, 2021

Federated Learning with Local Differential Privacy: Trade-offs between Privacy, Utility, and Communication.
IACR Cryptol. ePrint Arch., 2021

An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions.
Entropy, 2021

Designing IRS-Aided MIMO Systems for Secrecy Enhancement.
CoRR, 2021

Quality of Service Guarantees for Physical Unclonable Functions.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021

A Reverse Jensen Inequality Result with Application to Mutual Information Estimation.
Proceedings of the IEEE Information Theory Workshop, 2021

Semantic Security for Indoor THz-Wireless Communication.
Proceedings of the 17th International Symposium on Wireless Communication Systems, 2021

Doubly-Exponential Identification via Channels: Code Constructions and Bounds.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Secure Multi-Function Computation with Private Remote Sources.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Detectability of Denial-of-Service Attacks on Arbitrarily Varying Classical-Quantum Channels.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Reinforce Security: A Model-Free Approach Towards Secure Wiretap Coding.
Proceedings of the ICC 2021, 2021

Turing Meets Shannon: Algorithmic Constructability of Capacity-Achieving Codes.
Proceedings of the ICC 2021, 2021

Algorithmic Detection of Adversarial Attacks on Message Transmission and ACK/NACK Feedback.
Proceedings of the ICC 2021, 2021

Real Number Signal Processing can Detect Denial-of-Service Attacks.
Proceedings of the IEEE International Conference on Acoustics, 2021

Communication Over Block Fading Channels - An Algorithmic Perspective On Optimal Transmission Schemes.
Proceedings of the IEEE International Conference on Acoustics, 2021

Joint Active and Passive Secure Precoding in IRS-Aided MIMO Systems.
Proceedings of the IEEE Global Communications Conference, 2021

2020
Communication Under Channel Uncertainty: An Algorithmic Perspective and Effective Construction.
IEEE Trans. Signal Process., 2020

Denial-of-Service Attacks on Communication Systems: Detectability and Jammer Knowledge.
IEEE Trans. Signal Process., 2020

Identification Capacity of Channels With Feedback: Discontinuity Behavior, Super-Activation, and Turing Computability.
IEEE Trans. Inf. Theory, 2020

Secure Communication and Identification Systems - Effective Performance Evaluation on Turing Machines.
IEEE Trans. Inf. Forensics Secur., 2020

Secure Storage Capacity Under Rate Constraints - Continuity and Super Activation.
IEEE Trans. Inf. Forensics Secur., 2020

New Capacity Results for Fading Gaussian Multiuser Channels With Statistical CSIT.
IEEE Trans. Commun., 2020

Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication.
IACR Cryptol. ePrint Arch., 2020

Secret Key Agreement with Physical Unclonable Functions: An Optimality Summary.
IACR Cryptol. ePrint Arch., 2020

Low-complexity and Reliable Transforms for Physical Unclonable Functions.
IACR Cryptol. ePrint Arch., 2020

Differential Privacy for Eye Tracking with Temporal Correlations.
IACR Cryptol. ePrint Arch., 2020

Stealthy Secret Key Generation.
Entropy, 2020

Shannon meets Turing: Non-computability and non-approximability of the finite state channel capacity.
Commun. Inf. Syst., 2020

Deep learning based wiretap coding via mutual information estimation.
Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning, 2020

Neural Mutual Information Estimation for Channel Coding: State-of-the-Art Estimators, Analysis, and Performance Comparison.
Proceedings of the 21st IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2020

Linear Precoder Design for Physical Layer Security via Reconfigurable Intelligent Surfaces.
Proceedings of the 21st IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2020

Randomized Nested Polar Subcode Constructions for Privacy, Secrecy, and Storage.
Proceedings of the International Symposium on Information Theory and Its Applications, 2020

On the Algorithmic Computability of Achievability and Converse: ϵ-Capacity of Compound Channels and Asymptotic Bounds of Error-Correcting Codes.
Proceedings of the IEEE International Symposium on Information Theory, 2020

Robust Transmission Over Channels with Channel Uncertainty: an Algorithmic Perspective.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Hybrid Precoding for Secure Transmission in Reflect-Array-Assisted Massive MIMO Systems.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

On the ϵ-Capacity of Finite Compound Channels with Applications to the Strong Converse and Second Order Coding Rate.
Proceedings of the 54th Annual Conference on Information Sciences and Systems, 2020

Secure Transmission in IRS-Assisted MIMO Systems with Active Eavesdroppers.
Proceedings of the 54th Asilomar Conference on Signals, Systems, and Computers, 2020

2019
On the Algorithmic Computability of the Secret Key and Authentication Capacity Under Channel, Storage, and Privacy Leakage Constraints.
IEEE Trans. Signal Process., 2019

Wiretap Channels: Nonasymptotic Fundamental Limits.
IEEE Trans. Inf. Theory, 2019

On the Optimality of D2D Coded Caching With Uncoded Cache Placement and One-Shot Delivery.
IEEE Trans. Commun., 2019

Robustness of Low-Complexity Massive MIMO Architectures Against Passive Eavesdropping.
CoRR, 2019

The secrecy capacity of the arbitrarily varying wiretap channel under list decoding.
Adv. Math. Commun., 2019

Resource Allocation for Secure Communication Systems: Algorithmic Solvability.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019

Turing Meets Shannon: On the Algorithmic Computability of the Capacities of Secure Communication Systems (Invited Paper).
Proceedings of the 20th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2019

Deep Learning for Channel Coding via Neural Mutual Information Estimation.
Proceedings of the 20th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2019

Joint User Selection and Precoding in Multiuser MIMO Systems via Group LASSO.
Proceedings of the 30th IEEE Annual International Symposium on Personal, 2019

Private Authentication with Physical Identifiers Through Broadcast Channel Measurements.
Proceedings of the 2019 IEEE Information Theory Workshop, 2019

Coding for Non-IID Sources and Channels: Entropic Approximations and a Question of Ahlswede.
Proceedings of the 2019 IEEE Information Theory Workshop, 2019

On the Structure of the Capacity Formula for General Finite State Channels with Applications.
Proceedings of the 2019 IEEE Information Theory Workshop, 2019

On D2D Caching with Uncoded Cache Placement.
Proceedings of the IEEE International Symposium on Information Theory, 2019

On Stochastic Orders and Fading Gaussian Multi-User Channels with Statistical CSIT.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Identification Capacity of Correlation-Assisted Discrete Memoryless Channels: Analytical Properties and Representations.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Copulas and Multi-User Channel Orders.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Deep Learning for the Gaussian Wiretap Channel.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Detectability of Denial-of-service Attacks on Communication Systems.
Proceedings of the IEEE International Conference on Acoustics, 2019

On the Computability of the Secret Key Capacity under Rate Constraints.
Proceedings of the IEEE International Conference on Acoustics, 2019

Secure Regularized Zero Forcing for Multiuser MIMOME Channels.
Proceedings of the 53rd Asilomar Conference on Signals, Systems, and Computers, 2019

2018
Strong Secrecy for Interference Channels Based on Channel Resolvability.
IEEE Trans. Inf. Theory, 2018

Secret-Key Generation and Convexity of the Rate Region Using Infinite Compound Sources.
IEEE Trans. Inf. Forensics Secur., 2018

Controllable Identifier Measurements for Private Authentication With Secret Keys.
IEEE Trans. Inf. Forensics Secur., 2018

Secure Broadcasting Using Independent Secret Keys.
IEEE Trans. Commun., 2018

Full-Duplex Relaying With Improper Gaussian Signaling Over Nakagami-m Fading Channels.
IEEE Trans. Commun., 2018

Secure Communication in Spectrum-Sharing Massive MIMO Systems With Active Eavesdropping.
IEEE Trans. Cogn. Commun. Netw., 2018

Analytical Properties of Shannon's Capacity of Arbitrarily Varying Channels under List Decoding: Super-Additivity and Discontinuity Behavior.
Probl. Inf. Transm., 2018

Optimal Transmit Antenna Selection for Massive MIMO Wiretap Channels.
IEEE J. Sel. Areas Commun., 2018

Secure and Reliable Key Agreement with Physical Unclonable Functions.
Entropy, 2018

The Deterministic and Correlated Random Public-Confidential Capacity Regions of the Arbitrarily Varying Wiretap Channel.
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018

Performance Evaluation of Secure Communication Systems on Turing Machines.
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018

Iterative Antenna Selection for Secrecy Enhancement in Massive MIMO Wiretap Channels.
Proceedings of the 19th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2018

Privacy Amplification: Recent Developments and Applications.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Identification over Channels with Feedback: Discontinuity Behavior and Super-Activation.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Secrecy Capacity Under List Decoding For A Channel with A Passive Eavesdropper and an Active Jammer.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

On Robustness of Massive MIMO Systems against Passive Eavesdropping under Antenna Selection.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Secret-Key Generation Using Compound Sources and One-Way Public Communication.
IEEE Trans. Inf. Forensics Secur., 2017

Robust Biometric Authentication from an Information Theoretic Perspective.
Entropy, 2017

Artificial Noise-Aided Physical Layer Security in Underlay Cognitive Massive MIMO Systems with Pilot Contamination.
Entropy, 2017

On Stochastic Orders and Fast Fading Multiuser Channels with Statistical CSIT.
CoRR, 2017

Improper Signaling for Virtual Full-Duplex Relay Systems.
Proceedings of the WSA 2017, 2017

Stabilizing the secrecy capacity of the arbitrarily varying wiretap channel and transceiver synchronization using list decoding.
Proceedings of the 18th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2017

Characterization of super-additivity and discontinuity behavior of the capacity of arbitrarily varying channels under list decoding.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Secrecy-reliability tradeoff for semi-deterministic wiretap channels at finite Blocklength.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Secret-key capacity of infinite compound sources with communication rate constraint.
Proceedings of the IEEE International Conference on Communications, 2017

Improper signaling in two-path relay channels.
Proceedings of the 2017 IEEE International Conference on Communications Workshops, 2017

Optimal Number of Transmit Antennas for Secrecy Enhancement in Massive MIMOME Channels.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Secure Communication in Underlay Cognitive Massive MIMO Systems with Pilot Contamination.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Physical layer security in massive MIMO systems.
Proceedings of the 51st Asilomar Conference on Signals, Systems, and Computers, 2017

Stealthy keyless secret key generation from degraded sources.
Proceedings of the 51st Asilomar Conference on Signals, Systems, and Computers, 2017

2016
Optimal Transmit Strategy for MISO Channels With Joint Sum and Per-Antenna Power Constraints.
IEEE Trans. Signal Process., 2016

On the SNR-Evolution of the MMSE Function of Codes for the Gaussian Broadcast and Wiretap Channels.
IEEE Trans. Inf. Theory, 2016

On the Individual Secrecy Capacity Regions of the General, Degraded, and Gaussian Multi-Receiver Wiretap Broadcast Channel.
IEEE Trans. Inf. Forensics Secur., 2016

Super-Activation as a Unique Feature of Secure Communication in Malicious Environments.
Inf., 2016

Arbitrarily varying multiple access channels with conferencing encoders: List decoding and finite coordination resources.
Adv. Math. Commun., 2016

Secure communication in massive MIMO relay networks.
Proceedings of the 17th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2016

On ergodic fading Gaussian interference channels with statistical CSIT.
Proceedings of the 2016 IEEE Information Theory Workshop, 2016

Secret key generation through a relay.
Proceedings of the 2016 IEEE Information Theory Workshop, 2016

Secure transmission in cognitive massive MIMO systems with underlay spectrum sharing.
Proceedings of the 9th International Symposium on Turbo Codes and Iterative Information Processing, 2016

Finite-blocklength bounds for wiretap channels.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Super-activation as a unique feature of arbitrarily varying wiretap channels.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Degradedness and stochastic orders of fast fading Gaussian broadcast channels with statistical channel state information at the transmitter.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

Ergodic secrecy sum rate for multiuser MIMO downlink systems using block diagonalization.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

List decoding for arbitrarily varying wiretap channels.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Private authentication with controllable measurement.
Proceedings of the 50th Asilomar Conference on Signals, Systems and Computers, 2016

2015
The Secrecy Capacity of Compound Gaussian MIMO Wiretap Channels.
IEEE Trans. Inf. Theory, 2015

On the Continuity of the Secrecy Capacity of Compound and Arbitrarily Varying Wiretap Channels.
IEEE Trans. Inf. Forensics Secur., 2015

Secure Communication Under Channel Uncertainty and Adversarial Attacks.
Proc. IEEE, 2015

Capacity Regions for Broadcast Channels With Degraded Message Sets and Message Cognition Under Different Secrecy Constraints.
CoRR, 2015

On MMSE Properties of Codes for the Gaussian Broadcast and Wiretap Channels.
CoRR, 2015

Robust PUF based authentication.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

The individual secrecy capacity of the Gaussian SISO and degraded Gaussian MIMO multi-receiver wiretap channel.
Proceedings of the 16th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2015

Secret-Key capacity of compound source models with one-way public communication.
Proceedings of the 2015 IEEE Information Theory Workshop, 2015

Capacity region continuity of the compound broadcast channel with confidential messages.
Proceedings of the 2015 IEEE Information Theory Workshop, 2015

On MMSE properties of optimal codes for the Gaussian wiretap channel.
Proceedings of the 2015 IEEE Information Theory Workshop, 2015

How to use independent secret keys for secure broadcasting of common messages.
Proceedings of the IEEE International Symposium on Information Theory, 2015

On MMSE properties of "good" and "bad" codes for the Gaussian broadcast channel.
Proceedings of the IEEE International Symposium on Information Theory, 2015

The individual secrecy capacity of degraded multi-receiver wiretap broadcast channels.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Optimal transmission rate for MISO channels with joint sum and per-antenna power constraints.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

On MMSE properties of codes for the Gaussian broadcast channel with confidential messages.
Proceedings of the IEEE International Conference on Communication, 2015

On the continuity of the secrecy capacity of wiretap channels under channel uncertainty.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

On the Secrecy Capacity of Rank-Deficient Compound Wiretap Channels.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

On the Degradedness of Fast Fading Gaussian Multiple-Antenna Wiretap Channels with Statistical Channel State Information at the Transmitter.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

An I-MMSE based graphical representation of rate and equivocation for the Gaussian broadcast channel.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Strong secrecy for interference channels from channel resolvability.
Proceedings of the 49th Asilomar Conference on Signals, Systems and Computers, 2015

The multiple-access channel with an external eavesdropper: Trusted vs. untrusted users.
Proceedings of the 49th Asilomar Conference on Signals, Systems and Computers, 2015

2014
List Decoding for Arbitrarily Varying Broadcast Channels With Receiver Side Information.
IEEE Trans. Inf. Theory, 2014

Robust Broadcasting of Common and Confidential Messages Over Compound Channels: Strong Secrecy and Decoding Performance.
IEEE Trans. Inf. Forensics Secur., 2014

Physical Layer Service Integration in Wireless Networks : Signal processing challenges.
IEEE Signal Process. Mag., 2014

Joint and individual secrecy in broadcast channels with receiver side information.
Proceedings of the 2014 IEEE 15th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 2014

Secrecy measures for broadcast channels with receiver side information: Joint vs individual.
Proceedings of the 2014 IEEE Information Theory Workshop, 2014

On arbitrarily varying wiretap channels for different classes of secrecy measures.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

How much coordination is needed for robust broadcasting over arbitrarily varying bidirectional broadcast channels.
Proceedings of the IEEE International Conference on Communications, 2014

Arbitrarily varying wiretap channels with finite coordination resources.
Proceedings of the IEEE International Conference on Communications, 2014

List decoding for arbitrarily varying multiple access channels with conferencing encoders.
Proceedings of the IEEE International Conference on Communications, 2014

On the use of secret keys in broadcast channels with receiver side information.
Proceedings of the IEEE International Conference on Acoustics, 2014

Strong secrecy and decoding performance analysis for robust broadcasting under channel uncertainty.
Proceedings of the IEEE International Conference on Acoustics, 2014

On secure communication over multiple access wiretap channels under channel uncertainty.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Secure broadcasting of a common message with independent secret keys.
Proceedings of the 48th Annual Conference on Information Sciences and Systems, 2014

The compound secrecy capacity of a class of non-degraded MIMO Gaussian channels.
Proceedings of the 52nd Annual Allerton Conference on Communication, 2014

Robust transmission over wiretap channels with secret keys.
Proceedings of the 48th Asilomar Conference on Signals, Systems and Computers, 2014

2013
Strong Secrecy in Bidirectional Broadcast Channels With Confidential Messages.
IEEE Trans. Inf. Forensics Secur., 2013

Capacity Results and Super-Activation for Wiretap Channels With Active Wiretappers.
IEEE Trans. Inf. Forensics Secur., 2013

Wiretap Channels With Side Information - Strong Secrecy Capacity and Optimal Transceiver Design.
IEEE Trans. Inf. Forensics Secur., 2013

Polar Coding for Bidirectional Broadcast Channels with Common and Confidential Messages.
IEEE J. Sel. Areas Commun., 2013

MIMO Gaussian broadcast channels with private and confidential messages and with receiver side information.
Proceedings of the 14th IEEE Workshop on Signal Processing Advances in Wireless Communications, 2013

Bidirectional relay communication with additional private message.
Proceedings of the 14th IEEE Workshop on Signal Processing Advances in Wireless Communications, 2013

The secrecy capacity of a compound MIMO Gaussian channel.
Proceedings of the 2013 IEEE Information Theory Workshop, 2013

Capacity results, coordination resources, and super-activation in wiretap channels.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

On the strong secrecy capacity of wiretap channels with side information.
Proceedings of IEEE International Conference on Communications, 2013

Optimal transceiver design for wiretap channels with side information.
Proceedings of the IEEE International Conference on Acoustics, 2013

2012
Physical Layer Integration of Private, Common, and Confidential Messages in Bidirectional Relay Networks.
IEEE Trans. Wirel. Commun., 2012

Privacy in Bidirectional Relay Networks.
IEEE Trans. Commun., 2012

Impact of Interference in Coexisting Wireless Networks with Applications to Arbitrarily Varying Bidirectional Broadcast Channels.
Entropy, 2012

Robust transmit strategies for multiantenna bidirectional broadcast channels.
Proceedings of the International ITG Workshop on Smart Antennas, 2012

Comparison of different attack classes in arbitrarily varying wiretap channels.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Polar codes for bidirectional broadcast channels with common and confidential messages.
Proceedings of the 2012 International Symposium on Wireless Communication Systems (ISWCS), 2012

Strong secrecy in compound broadcast channels with confidential messages.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

2011
MIMO Gaussian Bidirectional Broadcast Channels with Common Messages.
IEEE Trans. Wirel. Commun., 2011

Bidirectional broadcast channels with common and confidential messages.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

How to achieve privacy in bidirectional relay networks.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Service integration in multiantenna bidirectional relay networks: Public and confidential messages.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011

Strong secrecy in bidirectional relay networks.
Proceedings of the Conference Record of the Forty Fifth Asilomar Conference on Signals, 2011

Secrecy in broadcast channels with receiver side information.
Proceedings of the Conference Record of the Forty Fifth Asilomar Conference on Signals, 2011

2010
Optimal Coding Strategies for Bidirectional Broadcast Channels Under Channel Uncertainty.
IEEE Trans. Commun., 2010

On arbitrarily varying bidirectional broadcast channels with constraints on input and states.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

List Decoding for Bidirectional Broadcast Channels with Unknown Varying Channels.
Proceedings of IEEE International Conference on Communications, 2010

Bidirectional relaying in wireless networks-impact of degree of coordination.
Proceedings of the IEEE International Conference on Acoustics, 2010

MIMO Bidirectional Broadcast Channels with Common Message.
Proceedings of the Global Communications Conference, 2010

Degrees of coordination in cognitive networks.
Proceedings of the 5th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2010

2009
Multiantenna bidirectional broadcast channels: optimal transmit strategies.
IEEE Trans. Signal Process., 2009

On the optimal transmit strategy for the MIMO bidirectional broadcast channel.
IEEE Trans. Commun., 2009

On the Capacity of Bidirectional Broadcast Channels under Channel Uncertainty.
Proceedings of IEEE International Conference on Communications, 2009

On the Optimal Transmission for the MIMO Bidirectional Broadcast Channel.
Proceedings of IEEE International Conference on Communications, 2009

Coding Strategies for Bidirectional Relaying for Arbitrarily Varying Channels.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Decode-and-forward strategies for bidirectional relaying.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

Capacity of Gaussian MIMO bidirectional broadcast channels.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008


  Loading...