Remi A. Chou

Orcid: 0000-0003-4431-3175

According to our database1, Remi A. Chou authored at least 66 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The Gaussian Multiple Access Wiretap Channel With Selfish Transmitters: A Coalitional Game Theory Perspective.
IEEE Trans. Inf. Theory, October, 2024

Secure Distributed Storage: Optimal Trade-Off Between Storage Rate and Privacy Leakage.
IEEE Trans. Inf. Theory, May, 2024

Private Information Retrieval With Private Noisy Side Information.
IEEE Trans. Inf. Theory, April, 2024

Distributed Secret Sharing Over a Public Channel From Correlated Random Variables.
IEEE Trans. Inf. Theory, April, 2024

Secure Source Coding Resilient Against Compromised Users via an Access Structure.
IEEE J. Sel. Areas Inf. Theory, 2024

The Capacity of Symmetric Private Information Retrieval with Private Noisy Side Information.
Proceedings of the IEEE International Symposium on Information Theory, 2024

Private Sum Computation: Trade-Off Between Shared Randomness and Privacy.
Proceedings of the IEEE International Symposium on Information Theory, 2024

Dual-Source Symmetric PIR Without Data Replication or Shared Randomness.
Proceedings of the IEEE International Symposium on Information Theory, 2024

Short Blocklength Secret Coding via Helper-Assisted Learning over the Wiretap Channel.
Proceedings of the IEEE International Conference on Communications, 2024

SPIR with Colluding and Non-Replicated Servers from a Noisy Channel.
Proceedings of the 60th Annual Allerton Conference on Communication, 2024

Distributed Matrix Multiplication: Download Rate, Randomness and Privacy Trade-Offs.
Proceedings of the 60th Annual Allerton Conference on Communication, 2024

2023
Short Blocklength Wiretap Channel Codes via Deep Learning: Design and Performance Evaluation.
IEEE Trans. Commun., March, 2023

Explicit Wiretap Channel Codes via Source Coding, Universal Hashing, and Distribution Approximation, When the Channels' Statistics are Uncertain.
IEEE Trans. Inf. Forensics Secur., 2023

Retractable Commitment over Noisy Channels.
Proceedings of the IEEE Information Theory Workshop, 2023

Private Information Retrieval When Private Noisy Side Information is Available.
Proceedings of the IEEE International Symposium on Information Theory, 2023

Secret Sharing Over a Gaussian Broadcast Channel: Optimal Coding Scheme Design and Deep Learning Approach at Short Blocklength.
Proceedings of the IEEE International Symposium on Information Theory, 2023

Adaptive Frequency Hopping for 5G New Radio mMTC Security.
Proceedings of the IEEE International Conference on Industrial Technology, 2023

Distributed Storage Over a Public Channel: Trade-off between Privacy and Shared Key Lengths.
Proceedings of the 59th Annual Allerton Conference on Communication, 2023

2022
Multiple Access Channel Resolvability Codes From Source Resolvability Codes.
IEEE Trans. Inf. Theory, 2022

Information-Theoretic Secret Sharing From Correlated Gaussian Random Variables and Public Communication.
IEEE Trans. Inf. Theory, 2022

Quantifying the Cost of Privately Storing Data in Distributed Storage Systems.
IEEE Trans. Inf. Theory, 2022

Private Classical Communication Over Quantum Multiple-Access Channels.
IEEE Trans. Inf. Theory, 2022

Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper.
Entropy, 2022

Secure Data Storage Resilient Against Compromised Users via an Access Structure.
Proceedings of the IEEE Information Theory Workshop, 2022

Function Computation Without Secure Links: Information and Leakage Rates.
Proceedings of the IEEE International Symposium on Information Theory, 2022

Commitment over Multiple-Access Channels.
Proceedings of the 58th Annual Allerton Conference on Communication, 2022

2021
Universal Covertness for Discrete Memoryless Sources.
IEEE Trans. Inf. Theory, 2021

Design of Short Blocklength Wiretap Channel Codes: Deep Learning and Cryptography Working Hand in Hand.
Proceedings of the IEEE Information Theory Workshop, 2021

Low-Complexity Secret Sharing Schemes Using Correlated Random Variables and Rate-Limited Public Communication.
Proceedings of the IEEE International Symposium on Information Theory, 2021

2020
Strongly Secure Multiuser Communication and Authentication With Anonymity Constraints.
IEEE Trans. Inf. Theory, 2020

Explicit Codes for the Wiretap Channel: A Unified Design Framework.
CoRR, 2020

Distributed Secure Storage: Rate-Privacy Trade-Off and XOR-Based Coding Scheme.
CoRR, 2020

Secret Sharing from Correlated Gaussian Random Variables and Public Communication.
Proceedings of the IEEE Information Theory Workshop, 2020

Pairwise Oblivious Transfer.
Proceedings of the IEEE Information Theory Workshop, 2020

Explicit Construction of Multiple Access Channel Resolvability Codes from Source Resolvability Codes.
Proceedings of the IEEE International Symposium on Information Theory, 2020

Secure Distributed Storage: Rate-Privacy Trade-Off and XOR-Based Coding Scheme.
Proceedings of the IEEE International Symposium on Information Theory, 2020

2019
Secret-Key Generation in Many-to-One Networks: An Integrated Game-Theoretic and Information-Theoretic Approach.
IEEE Trans. Inf. Theory, 2019

The Degraded Gaussian Many-Access Wiretap Channel.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Biometric Systems with Multiuser Access Structures.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Explicit Low-complexity Codes for Multiple Access Channel Resolvability.
Proceedings of the 57th Annual Allerton Conference on Communication, 2019

2018
Polar Coding for the Multiple Access Wiretap Channel via Rate-Splitting and Cooperative Jamming.
IEEE Trans. Inf. Theory, 2018

Empirical and Strong Coordination via Soft Covering With Polar Codes.
IEEE Trans. Inf. Theory, 2018

Secret Sharing over a Public Channel from Correlated Random Variables.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Explicit Codes for the Wiretap Channel with Uncertainty on the Eavesdropper's Channel.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Optimal Resource Allocation for SWIPT with Full-Duplex Operation and Secrecy.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

2017
Coding Schemes for Achieving Strong Secrecy at Negligible Cost.
IEEE Trans. Inf. Theory, 2017

The Gaussian multiple access wiretap channel when the eavesdropper can arbitrarily jam.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

The degraded Gaussian multiple access wiretap channel with selfish transmitters: A coalitional game theory perspective.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

A game theoretic treatment for pair-wise secret-key generation in many-to-one networks.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

2016
Polar Coding for the Broadcast Channel With Confidential Messages: A Random Binning Analogy.
IEEE Trans. Inf. Theory, 2016

Multiuser authentication with anonymity constraints over noisy channels.
Proceedings of the IEEE International Symposium on Information Theory, 2016

2015
Polar Coding for Secret-Key Generation.
IEEE Trans. Inf. Theory, 2015

Polar coding for the broadcast channel with confidential messages.
Proceedings of the 2015 IEEE Information Theory Workshop, 2015

Lossless and lossy source compression with near-uniform output: Is common randomness always required?
Proceedings of the IEEE International Symposium on Information Theory, 2015

Polar coding for empirical and strong coordination via distribution approximation.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Using deterministic decisions for low-entropy bits in the encoding and decoding of polar codes.
Proceedings of the 53rd Annual Allerton Conference on Communication, 2015

2014
Separation of Reliability and Secrecy in Rate-Limited Secret-Key Generation.
IEEE Trans. Inf. Theory, 2014

Polar Coding for the Broadcast Channel with Confidential Messages and Constrained Randomization.
CoRR, 2014

Low-complexity channel resolvability codes for the symmetric multiple-access channel.
Proceedings of the 2014 IEEE Information Theory Workshop, 2014

Uniform distributed source coding for the multiple access wiretap channel.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Practical Limitations of Secret-Key Generation in Narrowband Wireless Environments.
CoRR, 2013

Experimental aspects of secret key generation in indoor wireless environments.
Proceedings of the 14th IEEE Workshop on Signal Processing Advances in Wireless Communications, 2013

Data compression with nearly uniform output.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Secret-key generation with arbitrarily varying eavesdropper's channel.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

2012
Separation of Reliability and Secrecy in Rate-Limited Secret Key-Distillation
CoRR, 2012

One-way rate-limited sequential key-distillation.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012


  Loading...