


Остановите войну!
for scientists:


default search action
Dennis Goeckel
Dennis L. Goeckel
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j73]Bo Guan
, Nazanin Takbiri
, Dennis Goeckel
, Amir Houmansadr
, Hossein Pishro-Nik:
Superstring-Based Sequence Obfuscation to Thwart Pattern Matching Attacks. IEEE Internet Things J. 9(23): 23348-23365 (2022) - [j72]Azadeh Sheikholeslami, Majid Ghaderi
, Dennis Goeckel
:
Covert Communications in Multi-Channel Slotted ALOHA Systems. IEEE Trans. Mob. Comput. 21(6): 1958-1971 (2022) - [j71]Ke Li
, Tamara V. Sobers, Don Towsley
, Dennis Goeckel
:
Covert Communication in Continuous-Time Systems in the Presence of a Jammer. IEEE Trans. Wirel. Commun. 21(7): 4883-4897 (2022) - [c95]Saeede Enayati, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Constrained Obfuscation to Thwart Pattern Matching Attacks. ISIT 2022: 643-648 - [c94]Saeede Enayati, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Privacy-Preserving Path-Planning for UAVs. ISNCC 2022: 1-6 - 2021
- [j70]Nazanin Takbiri
, Minting Chen
, Dennis L. Goeckel
, Amir Houmansadr
, Hossein Pishro-Nik
:
Asymptotic Privacy Loss Due to Time Series Matching of Dependent Users. IEEE Commun. Lett. 25(4): 1079-1083 (2021) - [j69]Moslem Forouzesh
, Paeiz Azmi
, Nader Mokari
, Dennis Goeckel
:
Robust Power Allocation in Covert Communication: Imperfect CDI. IEEE Trans. Veh. Technol. 70(6): 5789-5802 (2021) - [c93]Alireza Bahramali, Milad Nasr, Amir Houmansadr, Dennis Goeckel, Don Towsley:
Robust Adversarial Attacks Against DNN-Based Wireless Communication Systems. CCS 2021: 126-140 - [c92]Ke Li, Majid Ghaderi, Dennis Goeckel:
Fundamental Limits of Activity-Based Covert Channels. GLOBECOM 2021: 1-6 - [i37]Alireza Bahramali, Milad Nasr, Amir Houmansadr, Dennis Goeckel, Don Towsley:
Robust Adversarial Attacks Against DNN-Based Wireless Communication Systems. CoRR abs/2102.00918 (2021) - [i36]Bo Guan, Nazanin Takbiri, Dennis Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Superstring-Based Sequence Obfuscation to Thwart Pattern Matching Attacks. CoRR abs/2108.12336 (2021) - 2020
- [j68]Ramin Soltani
, Dennis Goeckel
, Don Towsley
, Amir Houmansadr
:
Fundamental Limits of Covert Packet Insertion. IEEE Trans. Commun. 68(6): 3401-3414 (2020) - [j67]Ramin Soltani
, Dennis Goeckel
, Don Towsley
, Amir Houmansadr
:
Fundamental Limits of Invisible Flow Fingerprinting. IEEE Trans. Inf. Forensics Secur. 15: 345-360 (2020) - [j66]Nazanin Takbiri
, Amir Houmansadr
, Dennis L. Goeckel
, Hossein Pishro-Nik
:
Privacy of Dependent Users Against Statistical Matching. IEEE Trans. Inf. Theory 66(9): 5842-5865 (2020) - [j65]Mark Shifrin
, Daniel S. Menasché
, Asaf Cohen
, Dennis Goeckel
, Omer Gurewitz
:
Optimal PHY Configuration in Wireless Networks. IEEE/ACM Trans. Netw. 28(6): 2601-2614 (2020) - [j64]Moslem Forouzesh
, Paeiz Azmi
, Nader Mokari
, Dennis Goeckel
:
Covert Communication Using Null Space and 3D Beamforming: Uncertainty of Willie's Location Information. IEEE Trans. Veh. Technol. 69(8): 8568-8576 (2020) - [j63]Ke Li
, Patrick A. Kelly, Dennis Goeckel
:
Optimal Power Adaptation in Covert Communication With an Uninformed Jammer. IEEE Trans. Wirel. Commun. 19(5): 3463-3473 (2020) - [j62]Nazanin Takbiri
, Virat Shejwalkar
, Amir Houmansadr
, Dennis L. Goeckel
, Hossein Pishro-Nik
:
Leveraging Prior Knowledge Asymmetries in the Design of Location Privacy-Preserving Mechanisms. IEEE Wirel. Commun. Lett. 9(11): 2005-2009 (2020) - [c91]Bo Guan, Nazanin Takbiri, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Sequence Obfuscation to Thwart Pattern Matching Attacks. ISIT 2020: 884-889 - [c90]Alireza Bahramali, Amir Houmansadr, Ramin Soltani, Dennis Goeckel, Don Towsley:
Practical Traffic Analysis Attacks on Secure Messaging Applications. NDSS 2020 - [i35]Ke Li, Don Towsley, Dennis Goeckel:
Covert Communication in Continuous-Time Systems. CoRR abs/2001.06932 (2020) - [i34]Alireza Bahramali, Ramin Soltani, Amir Houmansadr, Dennis Goeckel, Don Towsley:
Practical Traffic Analysis Attacks on Secure Messaging Applications. CoRR abs/2005.00508 (2020) - [i33]Nazanin Takbiri, Minting Chen, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Asymptotic Privacy Loss due to Time Series Matching of Dependent Users. CoRR abs/2007.06119 (2020)
2010 – 2019
- 2019
- [j61]Nazanin Takbiri
, Amir Houmansadr
, Dennis L. Goeckel
, Hossein Pishro-Nik
:
Matching Anonymized and Obfuscated Time Series to Users' Profiles. IEEE Trans. Inf. Theory 65(2): 724-741 (2019) - [c89]Virat Shejwalkar, Amir Houmansadr, Hossein Pishro-Nik, Dennis Goeckel:
Revisiting utility metrics for location privacy-preserving mechanisms. ACSAC 2019: 313-327 - [c88]Nazanin Takbiri, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Asymptotic Limits of Privacy in Bayesian Time Series Matching. CISS 2019: 1-6 - [c87]Shihao Yan
, Stephen V. Hanly
, Iain B. Collings
, Dennis L. Goeckel:
Hiding Unmanned Aerial Vehicles for Wireless Transmissions by Covert Communications. ICC 2019: 1-6 - [c86]Bo Guan, Dennis L. Goeckel:
Achievable Information-Theoretic Secrecy in the Presence of a Radar. MILCOM 2019: 476-481 - [c85]Azadeh Sheikholeslami, Majid Ghaderi, Dennis Goeckel:
Covert Communications in Packet Collision Channels. WCNC 2019: 1-6 - [c84]Nazanin Takbiri, Ramin Soltani
, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Asymptotic Loss in Privacy due to Dependency in Gaussian Traces. WCNC 2019: 1-6 - [i32]Nazanin Takbiri, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Asymptotic Limits of Privacy in Bayesian Time Series Matching. CoRR abs/1902.06404 (2019) - [i31]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Fundamental Limits of Covert Packet Insertion. CoRR abs/1903.11640 (2019) - [i30]Nazanin Takbiri, Virat Shejwalkar, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Leveraging Prior Knowledge Asymmetries in the Design of Location Privacy-Preserving Mechanisms. CoRR abs/1912.02209 (2019) - 2018
- [j60]Adam C. Polak, Mark Wagner, Marco F. Duarte, Robert W. Jackson, Dennis L. Goeckel:
Mitigation of spectral leakage for single carrier, block-processing cognitive radio receivers. Digit. Commun. Networks 4(2): 106-110 (2018) - [j59]Azadeh Sheikholeslami
, Majid Ghaderi, Don Towsley, Boulat A. Bash
, Saikat Guha, Dennis Goeckel
:
Multi-Hop Routing in Covert Wireless Networks. IEEE Trans. Wirel. Commun. 17(6): 3656-3669 (2018) - [j58]Ramin Soltani
, Dennis Goeckel
, Don Towsley
, Boulat A. Bash
, Saikat Guha:
Covert Wireless Communication With Artificial Noise Generation. IEEE Trans. Wirel. Commun. 17(11): 7252-7267 (2018) - [c83]Ke Li, Hossein Pishro-Nik, Dennis L. Goeckel:
Fundamental Limits in Detecting Whether a Signal Has Been Quantized. ACSSC 2018: 1699-1703 - [c82]Ramin Soltani
, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Fundamental Limits of Covert Bit Insertion in Packets. Allerton 2018: 1065-1072 - [c81]Ke Li, Hossein Pishro-Nik, Dennis L. Goeckel:
Privacy against matching under anonymization and obfuscation in the Gaussian case. CISS 2018: 1-6 - [c80]Nazanin Takbiri, Ke Li, Hossein Pishro-Nik, Dennis L. Goeckel:
Statistical matching in the presence of anonymization and obfuscation: Non-asymptotic results in the discrete case. CISS 2018: 1-6 - [c79]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Privacy Against Statistical Matching: Inter-User Correlation. ISIT 2018: 1036-1040 - [c78]Dennis Goeckel, Azadeh Sheikholeslami, Tamara V. Sobers, Boulat A. Bash, Don Towsley, Saikat Guha:
Covert Communications in a Dynamic Interference Environment. SPAWC 2018: 1-5 - [i29]Azadeh Sheikholeslami, Majid Ghaderi, Don Towsley, Boulat A. Bash, Saikat Guha, Dennis Goeckel:
Multi-Hop Routing in Covert Wireless Networks. CoRR abs/1803.04100 (2018) - [i28]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Privacy against Statistical Matching: Inter-User Correlation. CoRR abs/1805.01296 (2018) - [i27]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Privacy of Dependent Users Against Statistical Matching. CoRR abs/1806.11108 (2018) - [i26]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Fundamental Limits of Invisible Flow Fingerprinting. CoRR abs/1809.08514 (2018) - [i25]Nazanin Takbiri, Ramin Soltani, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Asymptotic Loss in Privacy due to Dependency in Gaussian Traces. CoRR abs/1809.10289 (2018) - [i24]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Fundamental Limits of Covert Bit Insertion in Packets. CoRR abs/1810.03510 (2018) - 2017
- [j57]Azadeh Sheikholeslami
, Majid Ghaderi, Hossein Pishro-Nik, Dennis Goeckel:
Energy-Efficient Secrecy in Wireless Networks Based on Random Jamming. IEEE Trans. Commun. 65(6): 2522-2533 (2017) - [j56]Tamara V. Sobers
, Boulat A. Bash
, Saikat Guha, Don Towsley, Dennis Goeckel:
Covert Communication in the Presence of an Uninformed Jammer. IEEE Trans. Wirel. Commun. 16(9): 6193-6206 (2017) - [c77]Ramin Soltani
, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Towards provably invisible network flow fingerprints. ACSSC 2017: 258-262 - [c76]Ke Li, Hossein Pishro-Nik, Dennis L. Goeckel:
Bayesian time series matching and privacy. ACSSC 2017: 1677-1681 - [c75]Dennis Goeckel, Boulat A. Bash, Azadeh Sheikholeslami, Saikat Guha, Don Towsley:
Covert active sensing of linear systems. ACSSC 2017: 1692-1696 - [c74]Tamara V. Sobers, Boulat A. Bash, Saikat Guha, Don Towsley, Dennis Goeckel:
Covert communications on continuous-time channels in the presence of jamming. ACSSC 2017: 1697-1701 - [c73]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Fundamental limits of location privacy using anonymization. CISS 2017: 1-6 - [c72]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Limits of location privacy under anonymization and obfuscation. ISIT 2017: 764-768 - [c71]Mark Shifrin
, Daniel Sadoc Menasché, Asaf Cohen, Omer Gurewitz, Dennis Goeckel:
An SMDP approach to optimal PHY configuration in wireless networks. WONS 2017: 128-135 - [i23]Azadeh Sheikholeslami, Majid Ghaderi, Hossein Pishro-Nik, Dennis Goeckel:
Energy-Efficient Secrecy in Wireless Networks Based on Random Jamming. CoRR abs/1703.05194 (2017) - [i22]Ramin Soltani, Dennis Goeckel, Don Towsley, Boulat A. Bash, Saikat Guha:
Covert Wireless Communication with Artificial Noise Generation. CoRR abs/1709.07096 (2017) - [i21]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Matching Anonymized and Obfuscated Time Series to Users' Profiles. CoRR abs/1710.00197 (2017) - [i20]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Towards Provably Invisible Network Flow Fingerprints. CoRR abs/1711.10079 (2017) - 2016
- [j55]Dennis Goeckel, Boulat A. Bash, Saikat Guha, Don Towsley:
Covert Communications When the Warden Does Not Know the Background Noise Power. IEEE Commun. Lett. 20(2): 236-239 (2016) - [j54]Anand Seetharam, Jim Kurose, Dennis Goeckel:
A Markovian Model for Coarse-Timescale Channel Variation in Wireless Networks. IEEE Trans. Veh. Technol. 65(3): 1701-1710 (2016) - [j53]Azadeh Sheikholeslami, Majid Ghaderi, Hossein Pishro-Nik, Dennis Goeckel:
Energy-Efficient Routing in Wireless Networks in the Presence of Jamming. IEEE Trans. Wirel. Commun. 15(10): 6828-6842 (2016) - [j52]Boulat A. Bash
, Dennis Goeckel, Don Towsley:
Covert Communication Gains From Adversary's Ignorance of Transmission Time. IEEE Trans. Wirel. Commun. 15(12): 8394-8405 (2016) - [c70]Ramin Soltani
, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Covert communications on renewal packet channels. Allerton 2016: 548-555 - [c69]Azadeh Sheikholeslami, Boulat A. Bash, Don Towsley, Dennis Goeckel, Saikat Guha:
Covert communication over classical-quantum channels. ISIT 2016: 2064-2068 - [i19]Azadeh Sheikholeslami, Boulat A. Bash, Donald F. Towsley, Dennis Goeckel, Saikat Guha:
Covert Communication over Classical-Quantum Channels. CoRR abs/1601.06826 (2016) - [i18]Tamara V. Sobers, Boulat A. Bash, Saikat Guha, Don Towsley, Dennis Goeckel:
Covert Communication in the Presence of an Uninformed Jammer. CoRR abs/1608.00698 (2016) - [i17]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Covert Communications on Renewal Packet Channels. CoRR abs/1610.00368 (2016) - [i16]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Covert Communications on Poisson Packet Channels. CoRR abs/1610.00381 (2016) - [i15]Ramin Soltani, Boulat A. Bash, Dennis Goeckel, Saikat Guha, Don Towsley:
Covert Single-hop Communication in a Wireless Network with Distributed Artificial Noise Generation. CoRR abs/1610.00384 (2016) - [i14]Mark Shifrin, Daniel S. Menasché, Asaf Cohen, Omer Gurewitz, Dennis Goeckel:
An SMDP Approach to Optimal PHY Configuration in Wireless Networks. CoRR abs/1610.05598 (2016) - 2015
- [j51]Boulat A. Bash, Dennis Goeckel, Don Towsley, Saikat Guha:
Hiding information in noise: fundamental limits of covert wireless communication. IEEE Commun. Mag. 53(12): 26-31 (2015) - [j50]Adam C. Polak, Dennis L. Goeckel:
Wireless Device Identification Based on RF Oscillator Imperfections. IEEE Trans. Inf. Forensics Secur. 10(12): 2492-2501 (2015) - [j49]Majid Ghaderi, Dennis Goeckel, Ariel Orda, Mostafa Dehghan:
Minimum Energy Routing and Jamming to Thwart Wireless Network Eavesdroppers. IEEE Trans. Mob. Comput. 14(7): 1433-1448 (2015) - [j48]Adam C. Polak, Marco F. Duarte, Dennis L. Goeckel:
Performance Bounds for Grouped Incoherent Measurements in Compressive Sensing. IEEE Trans. Signal Process. 63(11): 2877-2887 (2015) - [j47]Adam C. Polak, Dennis L. Goeckel:
Identification of Wireless Devices of Users Who Actively Fake Their RF Fingerprints With Artificial Data Distortion. IEEE Trans. Wirel. Commun. 14(11): 5889-5899 (2015) - [j46]Azadeh Sheikholeslami, Dennis Goeckel, Hossein Pishro-Nik:
Jamming Based on an Ephemeral Key to Obtain Everlasting Security in Wireless Environments. IEEE Trans. Wirel. Commun. 14(11): 6072-6081 (2015) - [c68]Tamara V. Sobers
, Boulat A. Bash, Dennis Goeckel, Saikat Guha, Don Towsley:
Covert communication with the help of an uninformed jammer achieves positive rate. ACSSC 2015: 625-629 - [c67]Ramin Soltani
, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Covert communications on Poisson packet channels. Allerton 2015: 1046-1052 - [i13]Boulat A. Bash, Dennis Goeckel, Saikat Guha, Don Towsley:
Hiding Information in Noise: Fundamental Limits of Covert Wireless Communication. CoRR abs/1506.00066 (2015) - 2014
- [c66]Azadeh Sheikholeslami, Dennis Goeckel, Hossein Pishro-Nik:
Everlasting secrecy in disadvantaged wireless environments against sophisticated eavesdroppers. ACSSC 2014: 1994-1998 - [c65]Ramin Soltani
, Boulat A. Bash, Dennis Goeckel, Saikat Guha, Don Towsley:
Covert single-hop communication in a wireless network with distributed artificial noise generation. Allerton 2014: 1078-1085 - [c64]Azadeh Sheikholeslami, Hossein Pishro-Nik, Majid Ghaderi, Dennis Goeckel:
On the impact of dynamic jamming on end-to-end delay in linear wireless networks. CISS 2014: 1-6 - [c63]Adam C. Polak, Dennis Goeckel:
Wireless device identification based on RF oscillator imperfections. ICASSP 2014: 2679-2683 - [c62]Azadeh Sheikholeslami, Majid Ghaderi, Hossein Pishro-Nik, Dennis Goeckel:
Jamming-aware minimum energy routing in wireless networks. ICC 2014: 2313-2318 - [c61]Boulat A. Bash, Dennis Goeckel, Don Towsley:
LPD communication when the warden does not know when. ISIT 2014: 606-610 - [c60]Kyle Morrison, Dennis Goeckel:
Secrecy Rate Pair Constraints for Secure Throughput. MILCOM 2014: 479-484 - [c59]Nicaise Choungmo Fofack, Mostafa Dehghan, Don Towsley, Misha Badov, Dennis L. Goeckel:
On the Performance of General Cache Networks. VALUETOOLS 2014 - [i12]Boulat A. Bash, Dennis Goeckel, Don Towsley:
LPD Communication when the Warden Does Not Know When. CoRR abs/1403.1013 (2014) - [i11]Boulat A. Bash, Saikat Guha, Dennis Goeckel, Don Towsley:
Quantum-noise limited communication with low probability of detection. CoRR abs/1403.5616 (2014) - [i10]Boulat A. Bash, Andrei H. Gheorghe, Monika Patel, Jonathan L. Habif, Dennis Goeckel, Don Towsley, Saikat Guha:
Covert Optical Communication. CoRR abs/1404.7347 (2014) - [i9]Azadeh Sheikholeslami, Majid Ghaderi, Hossein Pishro-Nik, Dennis Goeckel:
Minimum Energy Routing in Wireless Networks in the Presence of Jamming. CoRR abs/1411.3736 (2014) - [i8]Azadeh Sheikholeslami, Dennis Goeckel, Hossein Pishro-Nik:
Jamming Based on an Ephemeral Key to Obtain Everlasting Security in Wireless Environments. CoRR abs/1412.6014 (2014) - 2013
- [j45]Cagatay Capar, Dennis Goeckel, Kenneth G. Paterson, Elizabeth A. Quaglia, Don Towsley, Murtaza Zafer:
Signal-flow-based analysis of wireless security protocols. Inf. Comput. 226: 37-56 (2013) - [j44]Wei Wei, Ting He, Chatschik Bisdikian, Dennis Goeckel, Bo Jiang, Lance M. Kaplan, Don Towsley:
Impact of In-Network Aggregation on Target Tracking Quality Under Network Delays. IEEE J. Sel. Areas Commun. 31(4): 808-818 (2013) - [j43]Azadeh Sheikholeslami, Dennis Goeckel, Hossein Pishro-Nik:
Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper's Receiver. IEEE J. Sel. Areas Commun. 31(9): 1828-1839 (2013) - [j42]Boulat A. Bash, Dennis Goeckel, Don Towsley:
Limits of Reliable Communication with Low Probability of Detection on AWGN Channels. IEEE J. Sel. Areas Commun. 31(9): 1921-1930 (2013) - [j41]Cagatay Capar, Dennis Goeckel, Don Towsley:
Broadcast Analysis for Extended Cooperative Wireless Networks. IEEE Trans. Inf. Theory 59(9): 5805-5810 (2013) - [j40]Sudarshan Vasudevan, Micah Adler, Dennis Goeckel, Don Towsley:
Efficient Algorithms for Neighbor Discovery in Wireless Networks. IEEE/ACM Trans. Netw. 21(1): 69-83 (2013) - [j39]Boulat A. Bash, Dennis Goeckel, Don Towsley:
Asymptotic Optimality of Equal Power Allocation for Linear Estimation of WSS Random Processes. IEEE Wirel. Commun. Lett. 2(3): 247-250 (2013) - [c58]Adam C. Polak, Marco F. Duarte, Robert W. Jackson, Dennis Goeckel:
Recovery of sparse signals from amplitude-limited sample sets. ICASSP 2013: 4663-4667 - [c57]Ting He, Dennis Goeckel, Ramya Raghavendra, Don Towsley:
Endhost-based shortest path routing in dynamic networks: An online learning approach. INFOCOM 2013: 2202-2210 - [c56]Boulat A. Bash, Saikat Guha, Dennis Goeckel, Don Towsley:
Quantum noise limited optical communication with low probability of detection. ISIT 2013: 1715-1719 - [c55]Azadeh Sheikholeslami, Dennis Goeckel, Hossein Pishro-Nik:
Artificial intersymbol interference (ISI) to exploit receiver imperfections for secrecy. ISIT 2013: 2950-2954 - [c54]Anand Seetharam, Bo Jiang, Dennis Goeckel, Jim Kurose, Robert E. Hancock:
Optimizing Control Overhead for Power-Aware Routing in Wireless Networks. MILCOM 2013: 870-875 - [c53]Mostafa Dehghan, Dennis L. Goeckel, Ting He, Don Towsley:
Inferring Military Activity in Hybrid Networks through Cache Behavior. MILCOM 2013: 1726-1731 - [c52]Majid Ghaderi, Dennis Goeckel, Ariel Orda, Mostafa Dehghan:
Efficient wireless security through jamming, coding and routing. SECON 2013: 505-513 - [i7]Majid Ghaderi, Dennis Goeckel, Ariel Orda, Mostafa Dehghan:
Efficient Wireless Security Through Jamming, Coding and Routing. CoRR abs/1304.2688 (2013) - 2012
- [j38]Zhiguo Ding, Kin K. Leung, Dennis Goeckel, Don Towsley:
On the Application of Cooperative Transmission to Secrecy Communications. IEEE J. Sel. Areas Commun. 30(2): 359-368 (2012) - [j37]Kyle Morrison, Cagatay Capar, Dennis Goeckel:
Peak Minimization for Reference-Based Ultra-Wideband (UWB) Radio. IEEE Trans. Commun. 60(8): 2054-2058 (2012) - [j36]Mostafa Dehghan, Dennis Goeckel, Majid Ghaderi, Zhiguo Ding:
Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks. IEEE Trans. Wirel. Commun. 11(9): 3025-3029 (2012) - [c51]Azadeh Sheikholeslami, Dennis Goeckel, Hossein Pishro-Nik:
Exploiting the non-commutativity of nonlinear operators for information-theoretic security in disadvantaged wireless environments. Allerton Conference 2012: 233-240 - [c50]Cagatay Capar, Dennis Goeckel:
Network coding for facilitating secrecy in large wireless networks. CISS 2012: 1-6 - [c49]Cagatay Capar, Dennis Goeckel, Benyuan Liu, Don Towsley:
Secret communication in large wireless networks without eavesdropper location information. INFOCOM 2012: 1152-1160 - [c48]