Abstract — In this work we consider the communication of information in the presence of a causal adversarial jammer. In the setting under study, a sender wishes to communicate a message to a receiver by transmitting a codeword x = (x1,..., xn) bit-by-bit over a communication channel. The sender and the receiver do not share common randomness. The adversarial jammer can view the transmitted bits xi one at a time, and can change up to a p-fraction of them. However, the decisions of the jammer must be made in a causal manner. Namely, for each bit xi the jammer’s decision on whether to corrupt it or not must depend only on xj for j ≤ i. This is in contrast to the “classical ” adversarial jamming situations in which the jammer has no knowledge o...
We characterize the capacity for the discrete-time arbitrarily varying channel with discrete inputs,...
We provide the first capacity approaching coding schemes that robustly simulate any interactive prot...
Channel capacity of a discrete channel is evaluated for a number of tactical situations involving an...
Abstract—In this work we consider the communication of information in the presence of a causal adver...
In this paper, we consider the communication of information in the presence of a causal adversarial ...
We consider the problem of communication over a channel with a causal jamming adversary subject to q...
In this paper, we consider the communication of information in the presence of an online adversarial...
We study communication in the presence of a jamming adversary where quadratic power constraints are ...
We consider the communication problem over binary causal adversarial erasure channels. Such a channe...
In this work we consider the communication of information in the presence of a delayed adversarial j...
We study achievable rates of reliable communication in a power-constrained two-way additive interfer...
We study communication systems over the state dependent channels in the presence of a malicious stat...
A friendly eavesdropper assists communication in a broadcast scenario in which one transmitter wishe...
The capacity of channels with block memory is investigated. It is shown that, when the problem is mo...
We consider a binary communication system where the transmitted signal amplitude varies according to...
We characterize the capacity for the discrete-time arbitrarily varying channel with discrete inputs,...
We provide the first capacity approaching coding schemes that robustly simulate any interactive prot...
Channel capacity of a discrete channel is evaluated for a number of tactical situations involving an...
Abstract—In this work we consider the communication of information in the presence of a causal adver...
In this paper, we consider the communication of information in the presence of a causal adversarial ...
We consider the problem of communication over a channel with a causal jamming adversary subject to q...
In this paper, we consider the communication of information in the presence of an online adversarial...
We study communication in the presence of a jamming adversary where quadratic power constraints are ...
We consider the communication problem over binary causal adversarial erasure channels. Such a channe...
In this work we consider the communication of information in the presence of a delayed adversarial j...
We study achievable rates of reliable communication in a power-constrained two-way additive interfer...
We study communication systems over the state dependent channels in the presence of a malicious stat...
A friendly eavesdropper assists communication in a broadcast scenario in which one transmitter wishe...
The capacity of channels with block memory is investigated. It is shown that, when the problem is mo...
We consider a binary communication system where the transmitted signal amplitude varies according to...
We characterize the capacity for the discrete-time arbitrarily varying channel with discrete inputs,...
We provide the first capacity approaching coding schemes that robustly simulate any interactive prot...
Channel capacity of a discrete channel is evaluated for a number of tactical situations involving an...