Willie K. Harrison

Orcid: 0000-0002-9375-9440

According to our database1, Willie K. Harrison authored at least 55 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Optimizing Secrecy Codes Using Gradient Descent.
CoRR, 2024

Subspace Decomposition of Coset Codes.
CoRR, 2024

Secrecy Coding for the Binary Symmetric Wiretap Channel via Linear Programming.
CoRR, 2024

How to Analyze Coaching: This is the WAE.
Proceedings of the Sports Analytics - First International Conference, 2024

The Two-Point Dilemma: Does Going for Two Win Close Football Games?
Proceedings of the Sports Analytics - First International Conference, 2024

WAR Accumulation Differential: A Statistic for Identifying Undervalued Players.
Proceedings of the Sports Analytics - First International Conference, 2024

2023
Optimizing Finite-Blocklength Nested Linear Secrecy Codes: Using the Worst Code to Find the Best Code.
Entropy, October, 2023

Physical Layer Security: Channel Sounding Results for the Multi-Antenna Wiretap Channel.
Entropy, October, 2023

Envelope distribution and Doppler spectrum of V2V channels at 5.9 GHz in mountainous roads.
Veh. Commun., February, 2023

2022
Estimators for Space-Time Block-Coded ARTM CPM in Aeronautical Mobile Telemetry.
IEEE Trans. Aerosp. Electron. Syst., 2022

Subspace Decomposition of Extreme-Rate Secrecy Codes.
Proceedings of the IEEE International Symposium on Information Theory, 2022

2021
SDR Proof-of-Concept of Full-Duplex Jamming for Enhanced Physical Layer Security.
Sensors, 2021

On Caching with Finite Blocklength Coding for Secrecy over the Binary Erasure Wiretap Channel.
Proceedings of the Wireless Telecommunications Symposium, 2021

New Dual Relationships for Error-Correcting Wiretap Codes.
Proceedings of the IEEE Information Theory Workshop, 2021

Keyed Polar Coding for Physical-Layer Security without Channel State Information.
Proceedings of the ICC 2021, 2021

Enumeration of the Degree Distribution Space for Finite Block Length LDPC Codes.
Proceedings of the ICC 2021, 2021

2020
Physical-Layer Security for Vehicle-to-Everything Networks: Increasing Security While Maintaining Reliable Communications.
IEEE Veh. Technol. Mag., 2020

Exact Equivocation Expressions for Wiretap Coding Over Erasure Channel Models.
IEEE Commun. Lett., 2020

Comparison of Latency with Selective Repeat and Rateless Coding in Delayed Feedback Systems.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

SDR Testbed of Full-Duplex Jamming for Secrecy.
Proceedings of the 12th International Symposium on Communication Systems, 2020

2019
Generating a Binary Symmetric Channel for Wiretap Codes.
IEEE Trans. Inf. Forensics Secur., 2019

Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach.
Entropy, 2019

Polar Coding for Physical-Layer Security without Knowledge of the Eavesdropper's Channel.
Proceedings of the 89th IEEE Vehicular Technology Conference, 2019

V2V Propagation in Mountainous Terrain: Part I - Experimental Configuration and Measurement Results.
Proceedings of the 2019 IEEE Latin-American Conference on Communications, 2019

V2V Propagation in Mountainous Terrain: Part II - Modeling Results.
Proceedings of the 2019 IEEE Latin-American Conference on Communications, 2019

Attributes of Generators for Best Finite Blocklength Coset Wiretap Codes over Erasure Channels.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Manufacturing an Erasure Wiretap Channel from Channel Sounding Measurements.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Physical-Layer Security: Does it Work in a Real Environment?
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Full-Duplex Jamming for Enhanced Hidden-Key Secrecy.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Adaptive Physical-Layer Security Through Punctured Coding for Secrecy.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Irregular Quadrature Amplitude Modulation for Adaptive Physical-Layer Security.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Analysis of short blocklength codes for secrecy.
EURASIP J. Wirel. Commun. Netw., 2018

Active Topology Inference in Store, Code, and Forward Networks.
Proceedings of the 15th International Symposium on Wireless Communication Systems, 2018

Cryptanalysis of Lempel-Ziv Compressed and Encrypted Text: The Statistics of Compression.
Proceedings of the 15th International Symposium on Wireless Communication Systems, 2018

On Peak-to-Average Power Ratio Optimization for Coded APSK.
Proceedings of the 15th International Symposium on Wireless Communication Systems, 2018

Nested QPSK Encoding for Information Theoretic Security.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

A Rateless Approach to Physical-Layer Security.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

On Dual Relationships of Secrecy Codes.
Proceedings of the 56th Annual Allerton Conference on Communication, 2018

2017
Quantifying equivocation for finite blocklength wiretap codes.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Interleaved Concatenated Coding for Secrecy in the Finite Blocklength Regime.
IEEE Signal Process. Lett., 2016

The Role of Graph Theory in System of Systems Engineering.
IEEE Access, 2016

2015
Interleaved Coding for Secrecy with a Hidden Key.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

Real-time rate-adaptable coding for fading channels.
Proceedings of the IEEE Signal Processing and Signal Processing Education Workshop, 2015

2014
An analysis of an HMM-based attack on the substitution cipher with error-prone ciphertext.
Proceedings of the IEEE International Conference on Communications, 2014

Parity modifications and stopping sets in high-rate codes for physical-layer security.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security.
IEEE Signal Process. Mag., 2013

Coset codes in a multi-hop network.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2013

2012
Physical-layer security: practical aspects of channel coding and cryptography.
PhD thesis, 2012

Equivocations for the simple substitution cipher with erasure-prone ciphertext.
Proceedings of the 2012 IEEE Information Theory Workshop, 2012

Physical-layer security over correlated erasure channels.
Proceedings of IEEE International Conference on Communications, 2012

2011
Coding for Cryptographic Security Enhancement Using Stopping Sets.
IEEE Trans. Inf. Forensics Secur., 2011

Physical-Layer Security over Correlated Erasure Channels
CoRR, 2011

2010
Stopping sets for physical-layer security.
Proceedings of the 2010 IEEE Information Theory Workshop, 2010

2009
Tandem coding and cryptography on wiretap channels: EXIT chart analysis.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Physical-Layer Security: Combining Error Control Coding and Cryptography.
Proceedings of IEEE International Conference on Communications, 2009


  Loading...