
-
Tight List-Sizes for Oblivious AVCs under Constraints
We study list-decoding over adversarial channels governed by oblivious a...
read it
-
Communication Efficient Secret Sharing in the Presence of Malicious Adversary
Consider the communication efficient secret sharing problem. A dealer wa...
read it
-
Quadratically Constrained Two-way Adversarial Channels
We study achievable rates of reliable communication in a power-constrain...
read it
-
Undetectable Radios: Covert Communication under Spectral Mask Constraints
We consider the problem of covert communication over continuous-time add...
read it
-
Generalized List Decoding
This paper concerns itself with the question of list decoding for genera...
read it
-
Arbitrarily Varying Remote Sources
We study a lossy source coding problem for an arbitrarily varying remote...
read it
-
Quadratically Constrained Channels with Causal Adversaries
We consider the problem of communication over a channel with a causal ja...
read it
-
Multipath Stealth Communication with Jammers
We consider the problem of stealth communication over a multipath networ...
read it
-
Covert Communication over Adversarially Jammed Channels
We consider a situation in which a transmitter Alice may wish to communi...
read it
-
Communication over an Arbitrarily Varying Channel under a State-Myopic Encoder
We study the problem of communication over a discrete arbitrarily varyin...
read it
-
Quadratically Constrained Myopic Adversarial Channels
We study communication in the presence of a jamming adversary where quad...
read it
-
Secure Adaptive Group Testing
Group Testing (GT) addresses the problem of identifying a small subset o...
read it
-
Novel Impossibility Results for Group-Testing
In this work we prove non-trivial impossibility results for perhaps the ...
read it