Abstract—In this work we consider the communication of information in the presence of a causal adversarial jammer. In the setting under study, a sender wishes to communicate a message to a receiver by transmitting a codeword x = (x1,..., xn) bit-by-bit over a communication channel. The adversarial jammer can view the transmitted bits xi one at a time, and can change up to a p-fraction of them. However, the decisions of the jammer must be made in a causal manner. Namely, for each bit xi the jammer’s decision on whether to corrupt it or not (and on how to change it) must depend only on xj for j ≤ i. This is in contrast to the “classical ” adversarial jammer which may base its decisions on its complete knowledge of x. Binary channels with caus...
A friendly eavesdropper assists communication in a broadcast scenario in which one transmitter wishe...
We provide the first capacity approaching coding schemes that robustly simulate any interactive prot...
We study reliable communication over point-to-point adversarial channels in which the adversary can ...
Abstract — In this work we consider the communication of information in the presence of a causal adv...
In this paper, we consider the communication of information in the presence of a causal adversarial ...
We consider the problem of communication over a channel with a causal jamming adversary subject to q...
In this paper, we consider the communication of information in the presence of an online adversarial...
We study communication in the presence of a jamming adversary where quadratic power constraints are ...
We consider the communication problem over binary causal adversarial erasure channels. Such a channe...
In this work we consider the communication of information in the presence of a delayed adversarial j...
We characterize the capacity for the discrete-time arbitrarily varying channel with discrete inputs,...
We study achievable rates of reliable communication in a power-constrained two-way additive interfer...
The capacity of channels with block memory is investigated. It is shown that, when the problem is mo...
We study communication systems over the state dependent channels in the presence of a malicious stat...
We consider a binary communication system where the transmitted signal amplitude varies according to...
A friendly eavesdropper assists communication in a broadcast scenario in which one transmitter wishe...
We provide the first capacity approaching coding schemes that robustly simulate any interactive prot...
We study reliable communication over point-to-point adversarial channels in which the adversary can ...
Abstract — In this work we consider the communication of information in the presence of a causal adv...
In this paper, we consider the communication of information in the presence of a causal adversarial ...
We consider the problem of communication over a channel with a causal jamming adversary subject to q...
In this paper, we consider the communication of information in the presence of an online adversarial...
We study communication in the presence of a jamming adversary where quadratic power constraints are ...
We consider the communication problem over binary causal adversarial erasure channels. Such a channe...
In this work we consider the communication of information in the presence of a delayed adversarial j...
We characterize the capacity for the discrete-time arbitrarily varying channel with discrete inputs,...
We study achievable rates of reliable communication in a power-constrained two-way additive interfer...
The capacity of channels with block memory is investigated. It is shown that, when the problem is mo...
We study communication systems over the state dependent channels in the presence of a malicious stat...
We consider a binary communication system where the transmitted signal amplitude varies according to...
A friendly eavesdropper assists communication in a broadcast scenario in which one transmitter wishe...
We provide the first capacity approaching coding schemes that robustly simulate any interactive prot...
We study reliable communication over point-to-point adversarial channels in which the adversary can ...