Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Song, Eva C."'
The secrecy performance of a source-channel model is studied in the context of lossy source compression over a noisy broadcast channel. The source is causally revealed to the eavesdropper during decoding. The fidelity of the transmission to the legit
Externí odkaz:
http://arxiv.org/abs/1504.05538
A secrecy system with side information at the decoders is studied in the context of lossy source compression over a noiseless broadcast channel. The decoders have access to different side information sequences that are correlated with the source. The
Externí odkaz:
http://arxiv.org/abs/1410.1002
Publikováno v:
IEEE Transactions on Information Theory, vol. 62, no. 4, pp. 1836-1849, April 2016
A likelihood encoder is studied in the context of lossy source compression. The analysis of the likelihood encoder is based on the soft-covering lemma. It is demonstrated that the use of a likelihood encoder together with the soft-covering lemma yiel
Externí odkaz:
http://arxiv.org/abs/1408.4522
In this work, a likelihood encoder is studied in the context of lossy source compression. The analysis of the likelihood encoder is based on a soft-covering lemma. It is demonstrated that the use of a likelihood encoder together with the soft-coverin
Externí odkaz:
http://arxiv.org/abs/1404.5683
Autor:
Cuff, Paul, Song, Eva C.
The likelihood encoder with a random codebook is demonstrated as an effective tool for source coding. Coupled with a soft covering lemma (associated with channel resolvability), likelihood encoders yield simple achievability proofs for known results,
Externí odkaz:
http://arxiv.org/abs/1307.8327
In this paper, the compression of an independent and identically distributed Gaussian source sequence is studied in an unsecure network. Within a game theoretic setting for a three-party noiseless communication network (sender Alice, legitimate recei
Externí odkaz:
http://arxiv.org/abs/1307.7365
Publikováno v:
IEEE Trans. on Communications, 62(3):1080-90, March, 2014
Optical networks are vulnerable to physical layer attacks; wiretappers can improperly receive messages intended for legitimate recipients. Our work considers an aspect of this security problem within the domain of multimode fiber (MMF) transmission.
Externí odkaz:
http://arxiv.org/abs/1304.4181
Imperfect secrecy in communication systems is investigated. Instead of using equivocation as a measure of secrecy, the distortion that an eavesdropper incurs in producing an estimate of the source sequence is examined. The communication system consis
Externí odkaz:
http://arxiv.org/abs/1210.1549
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
2015 International Workshop on Computational Electronics (IWCE); 2015, p301-307, 7p