We consider the problem of communication over a channel with a causal jamming adversary subject to quadratic constraints. A sender Alice wishes to communicate a message to a receiver Bob by transmitting a real-valued length-n codeword x=(x_1, ..., x_n) through a communication channel. Alice and Bob do not share common randomness. Knowing Alice's encoding strategy, a jammer James chooses a real-valued length- n adversarial noise sequence s=(s_1, ..., s_n) in a causal manner: each s_t (1 ≤ t ≤ n) can only depend on (x_1, ..., x_t). Bob receives y, the sum (over R) of Alice's transmission x and James' jamming vector s, and is required to reliably estimate Alice's message from this sum. In addition, Alice and James's transmission powers are res...
This paper considers a zero-sum game between a team of delay-constrained encoder and decoder, and a ...
abstract: The open nature of the wireless communication medium makes it inherently vulnerable to an ...
A central question in information theory is to determine the maximum success probability that can be...
We consider the problem of communication over a channel with a causal jamming adversary subject to q...
We study communication in the presence of a jamming adversary where quadratic power constraints are ...
We study achievable rates of reliable communication in a power-constrained two-way additive interfer...
In this paper, we consider the communication of information in the presence of a causal adversarial ...
Abstract—In this work we consider the communication of information in the presence of a causal adver...
Abstract—In this work we study an Arbitrarily Varying Chan-nel (AVC) with quadratic power constraint...
We study reliable communication over point-to-point adversarial channels in which the adversary can ...
We characterize the capacity for the discrete-time arbitrarily varying channel with discrete inputs,...
A friendly eavesdropper assists communication in a broadcast scenario in which one transmitter wishe...
The capacity of channels with block memory is investigated. It is shown that, when the problem is mo...
We pose the finite blocklength communication problem in the presence of a jammer as a zero-sum game ...
In this paper, we consider the communication of information in the presence of an online adversarial...
This paper considers a zero-sum game between a team of delay-constrained encoder and decoder, and a ...
abstract: The open nature of the wireless communication medium makes it inherently vulnerable to an ...
A central question in information theory is to determine the maximum success probability that can be...
We consider the problem of communication over a channel with a causal jamming adversary subject to q...
We study communication in the presence of a jamming adversary where quadratic power constraints are ...
We study achievable rates of reliable communication in a power-constrained two-way additive interfer...
In this paper, we consider the communication of information in the presence of a causal adversarial ...
Abstract—In this work we consider the communication of information in the presence of a causal adver...
Abstract—In this work we study an Arbitrarily Varying Chan-nel (AVC) with quadratic power constraint...
We study reliable communication over point-to-point adversarial channels in which the adversary can ...
We characterize the capacity for the discrete-time arbitrarily varying channel with discrete inputs,...
A friendly eavesdropper assists communication in a broadcast scenario in which one transmitter wishe...
The capacity of channels with block memory is investigated. It is shown that, when the problem is mo...
We pose the finite blocklength communication problem in the presence of a jammer as a zero-sum game ...
In this paper, we consider the communication of information in the presence of an online adversarial...
This paper considers a zero-sum game between a team of delay-constrained encoder and decoder, and a ...
abstract: The open nature of the wireless communication medium makes it inherently vulnerable to an ...
A central question in information theory is to determine the maximum success probability that can be...