We introduce the problem of determining the identity of a byzantine user...
We consider the problem of authenticated communication over a discrete
a...
We study the Chernoff-Stein exponent of the following binary hypothesis
...
We study communication over a Multiple Access Channel (MAC) where users ...
We propose a communication model, that we call compound arbitrarily vary...
We introduce the problem of determining the identity of a byzantine user...
In this paper, we introduce a new tensor decomposition for third order
t...
A simple approach for matrix completion and recovery is via low rank mat...
We consider the problem of covert communication over continuous-time add...
We study communication over multiple access channels (MAC) where one of ...
We consider the problem of stealth communication over a multipath networ...
We consider a situation in which a transmitter Alice may wish to communi...