Results 1 to 10 of about 8,284 (186)
E - Capacity - Equivocation Region of Wiretap Channel [PDF]
One of the problems of information - theoretic security concerns secure communication over a wiretap channel. The aim in the general wiretap channel model is to maximize the rate of the reliable communication from the source to the legitimate receiver ...
Mariam Haroutunian
doaj +4 more sources
Editorial introduction to J.UCS special issue Challenges for Smart Environments – Human-Centered Computing, Data Science, and Ambient Intelligence I [PDF]
Modern technologies and various domains of human activities increasingly rely on data science to develop smarter and autonomous systems. This trend has already changed the whole landscape of the global economy becoming more AI-driven.
Nelson Baloian, José Pino
doaj +3 more sources
Capacity-Equivocation Regions of the DMBCs with Noiseless Feedback [PDF]
The discrete memoryless broadcast channels (DMBCs) with noiseless feedback are studied. The entire capacity-equivocation regions of two models of the DMBCs with noiseless feedback are obtained. One is the degraded DMBCs with rate-limited feedback; the other is thelessandreversely less noisyDMBCs with causal feedback.
Xinxing Yin, Zhi Xue, Bin Dai
openaire +3 more sources
Capacity-Equivocation Region of the Gaussian MIMO Wiretap Channel [PDF]
Submitted to IEEE Transactions on Information Theory, April ...
Ekrem, Ersen, Ulukus, Sennur
openaire +2 more sources
Some New Results on the Wiretap Channel with Side Information
In this paper, the model of wiretap channel has been reconsidered for the case that the main channel is controlled by channel state information (side information), and it is available at the transmitter in a noncausal manner (termed here noncausal side ...
Yuan Luo, Bin Dai
doaj +1 more source
Wiretap Channel with Information Embedding on Actions
Information embedding on actions is a new channel model in which a specific decoder is used to observe the actions taken by the encoder and retrieve part of the message intended for the receiver.
Xinxing Yin, Zhi Xue
doaj +1 more source
Degraded Broadcast Channel with Side Information, Confidential Messages and Noiseless Feedback [PDF]
In this paper, first, we investigate the model of degraded broadcast channel with side information and confidential messages. This work is from Steinberg's work on the degraded broadcast channel with causal and noncausal side information, and Csisz ...
Dai, Bin +3 more
core +1 more source
Wiretap Channel with Action-Dependent Channel State Information
In this paper, we investigate the model of wiretap channel with action-dependent channel state information. Given the message to be communicated, the transmitter chooses an action sequence that affects the formation of the channel states, and then ...
Bin Dai +3 more
doaj +1 more source
Secure transmission of correlated sources over broadcast channels with ultra-low latency
Correlated sources passing through broadcast channels is considered in this paper. Each receiver has access to correlated source side information and each source at the sender is kept secret from the unintended receiver.
Hehe Chen, Ping Zhu
doaj +1 more source
In this paper, the general wiretap channel with channel state information (CSI) at the transmitter and noiseless feedback is investigated, where the feedback is from the legitimate receiver to the transmitter, and the CSI is available at the transmitter ...
Bin Dai, Zheng Ma, Linman Yu
doaj +1 more source

