Designing capacity achieving coding schemes for the band-limited additiv...
We consider a wireless communication system with a passive eavesdropper,...
This work considers the problem of mitigating information leakage betwee...
How to provide information security while fulfilling ultra reliability a...
It is a known problem that deep-learning-based end-to-end (E2E) channel
...
As we are more and more dependent on the communication technologies,
res...
Small neural networks (NNs) used for error correction were shown to impr...
This work extends the concept of channel hardening to multi-antenna syst...
The problem of secure source coding with multiple terminals is extended ...
Unlike active array antennas, intelligent reflecting surfaces (IRSs) are...
The capacity of a channel can usually be characterized as a maximization...
This work considers mitigation of information leakage between communicat...
The capacity of finite state channels (FSCs) with feedback has been show...
The Jensen inequality is a widely used tool in a multitude of fields, su...
We consider a secret key agreement problem in which noisy physical unclo...
Consider the identification (ID) via channels problem, where a receiver ...
We consider a distributed function computation problem in which parties
...
We consider a cache-aided wireless device-to-device (D2D) network under ...
The use of deep learning-based techniques for approximating secure encod...
Physical-layer security (PLS) for industrial indoor terahertz (THz) wire...
Intelligent reflecting surfaces (IRSs) enable multiple-input multiple-ou...
Federated learning (FL) allows to train a massive amount of data private...
We address security and privacy problems for digital devices and biometr...
This work studies secure transmission in intelligent reflecting surfaces...
The capacity of finite state channels (FSCs) has been established as the...
Deep learning based physical layer design, i.e., using dense neural netw...
We consider polar subcodes (PSCs), which are polar codes (PCs) with
dyna...
Noisy measurements of a physical unclonable function (PUF) are used to s...
Different transforms used in binding a secret key to correlated
physical...
Head mounted displays bring eye tracking into daily use and this raises
...
The problem of secret-key based authentication under privacy and storage...
Invoking large transmit antenna arrays, massive MIMO wiretap settings ar...
This paper proposes a new linear precoding scheme for downlink transmiss...
Joint user selection and precoding in multiuser MIMO settings can be
int...
A basic model for key agreement with biometric or physical identifiers i...
End-to-end deep learning for communication systems, i.e., systems whose
...
We consider a cache-aided wireless device-to-device (D2D) network under ...
End-to-end learning of communication systems with neural networks and
pa...
In massive MIMO wiretap settings, the base station can significantly sup...
The growth of interest in massive MIMO systems is accompanied with hardw...
The problem of secret-key based authentication under a privacy constrain...
In this paper, we study the impacts of transmit antenna selection on the...
In this paper, we investigate the ergodic capacity of fast fading Gaussi...