default search action
Matthieu R. Bloch
Person information
- affiliation: Georgia Institute of Technology, Atlanta, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c105]Shi-Yuan Wang, Meng-Che Chang, Matthieu R. Bloch:
Covert Joint Communication and Sensing under Variational Distance Constraint. CISS 2024: 1-6 - [c104]Onur Günlü, Matthieu R. Bloch, Rafael F. Schaefer, Aylin Yener:
Nonasymptotic Performance Limits of Low-Latency Secure Integrated Sensing and Communication Systems. ICASSP 2024: 12971-12975 - [c103]Tyler Kann, Shrinivas Kudekar, Matthieu R. Bloch:
A Path Metric Based Construction of Polarization-Adjusted Convolutional Codes. ISIT 2024: 2406-2411 - [c102]Shi-Yuan Wang, Shang-Jen Su, Matthieu R. Bloch:
Resource-Efficient Entanglement-Assisted Covert Communications over Bosonic Channels. ISIT 2024: 3106-3111 - [i67]Serhat Bakirtas, Matthieu R. Bloch, Elza Erkip:
Pilot-Attacks Can Enable Positive-Rate Covert Communications of Wireless Hardware Trojans. CoRR abs/2404.09922 (2024) - [i66]Martin Mittelbach, Rafael F. Schaefer, Matthieu R. Bloch, Aylin Yener, Onur Günlü:
Secure Integrated Sensing and Communication Under Correlated Rayleigh Fading. CoRR abs/2408.17050 (2024) - [i65]Shi-Yuan Wang, Keerthi S. K. Arumugam, Matthieu R. Bloch:
Bounds on Covert Capacity in the Sub-Exponential Slotted Asynchronous Regime. CoRR abs/2409.07777 (2024) - [i64]Martin Mittelbach, Rafael F. Schaefer, Matthieu R. Bloch, Aylin Yener, Onur Günlü:
Secure Integrated Sensing and Communication under Correlated Rayleigh Fading. IACR Cryptol. ePrint Arch. 2024: 290 (2024) - 2023
- [j49]Onur Günlü, Matthieu R. Bloch, Rafael F. Schaefer, Aylin Yener:
Secure Integrated Sensing and Communication. IEEE J. Sel. Areas Inf. Theory 4: 40-53 (2023) - [j48]Meng-Che Chang, Shi-Yuan Wang, Tuna Erdogan, Matthieu R. Bloch:
Rate and Detection-Error Exponent Tradeoff for Joint Communication and Sensing of Fixed Channel States. IEEE J. Sel. Areas Inf. Theory 4: 245-259 (2023) - [j47]Laura Luzzi, Cong Ling, Matthieu R. Bloch:
Optimal Rate-Limited Secret Key Generation From Gaussian Sources Using Lattices. IEEE Trans. Inf. Theory 69(8): 4944-4960 (2023) - [c101]Meng-Che Chang, Matthieu R. Bloch:
Distributed Stochastic Bandits with Corrupted and Defective Input Commands. ISIT 2023: 1318-1323 - [c100]Tyler Kann, Shrinivas Kudekar, Matthieu R. Bloch:
Source Polarization-Adjusted Convolutional Codes. ISIT 2023: 1896-1901 - [c99]Rémi A. Chou, Matthieu R. Bloch:
Retractable Commitment over Noisy Channels. ITW 2023: 260-265 - [c98]Meng-Che Chang, Shi-Yuan Wang, Matthieu R. Bloch:
Sequential Joint Communication and Sensing of Fixed Channel States. ITW 2023: 462-467 - [c97]Onur Günlü, Matthieu R. Bloch, Rafael F. Schaefer, Aylin Yener:
Secure Integrated Sensing and Communication for Binary Input Additive White Gaussian Noise Channels. JC&S 2023: 1-6 - [i63]Onur Günlü, Matthieu R. Bloch, Rafael F. Schaefer, Aylin Yener:
Secure Integrated Sensing and Communication. CoRR abs/2303.11350 (2023) - [i62]Meng-Che Chang, Matthieu R. Bloch:
Covert Online Decision Making: From Sequential Hypothesis Testing to Stochastic Bandits. CoRR abs/2311.12176 (2023) - 2022
- [j46]Naga Sasikanth Mannem, Tzu-Yuan Huang, Elham Erfani, Sensen Li, David Joseph Munzer, Matthieu R. Bloch, Hua Wang:
A 25-34-GHz Eight-Element MIMO Transmitter for Keyless High Throughput Directionally Secure Communication. IEEE J. Solid State Circuits 57(5): 1244-1256 (2022) - [j45]Hassan ZivariFard, Matthieu R. Bloch, Aria Nosratinia:
Keyless Covert Communication via Channel State Information. IEEE Trans. Inf. Theory 68(8): 5440-5474 (2022) - [j44]Onur Günlü, Matthieu R. Bloch, Rafael F. Schaefer:
Private Remote Sources for Secure Multi-Function Computation. IEEE Trans. Inf. Theory 68(10): 6826-6841 (2022) - [c96]Meng-Che Chang, Shi-Yuan Wang, Matthieu R. Bloch:
Controlled Sensing with Corrupted Commands. Allerton 2022: 1-7 - [c95]Rémi A. Chou, Matthieu R. Bloch:
Commitment over Multiple-Access Channels. Allerton 2022: 1-6 - [c94]Hassan ZivariFard, Matthieu R. Bloch, Aria Nosratinia:
Covert Communication in the Presence of an Uninformed, Informed, and Coordinated Jammer. ISIT 2022: 306-311 - [c93]Shi-Yuan Wang, Tuna Erdogan, Matthieu R. Bloch:
Towards a Characterization of the Covert Capacity of Bosonic Channels under Trace Distance. ISIT 2022: 318-323 - [c92]Meng-Che Chang, Matthieu R. Bloch:
Covert Best Arm Identification of Stochastic Bandits. ISIT 2022: 324-329 - [c91]Onur Günlü, Matthieu R. Bloch, Rafael F. Schaefer, Aylin Yener:
Secure Joint Communication and Sensing. ISIT 2022: 844-849 - [c90]Shi-Yuan Wang, Tuna Erdogan, Uzi Pereg, Matthieu R. Bloch:
Joint Quantum Communication and Sensing. ITW 2022: 506-511 - [c89]Meng-Che Chang, Tuna Erdogan, Shi-Yuan Wang, Matthieu R. Bloch:
Rate and Detection Error-Exponent Tradeoffs of Joint Communication and Sensing. JC&S 2022: 1-6 - [i61]Onur Günlü, Matthieu R. Bloch, Rafael F. Schaefer, Aylin Yener:
Secure Joint Communication and Sensing. CoRR abs/2202.10790 (2022) - [i60]Laura Luzzi, Cong Ling, Matthieu R. Bloch:
Secret key generation from Gaussian sources using lattice-based extractors. CoRR abs/2206.10443 (2022) - [i59]Meng-Che Chang, Shi-Yuan Wang, Tuna Erdogan, Matthieu R. Bloch:
Rate and Detection-Error Exponent Tradeoff for Joint Communication and Sensing of Fixed Channel States. CoRR abs/2210.07963 (2022) - [i58]Onur Günlü, Matthieu R. Bloch, Rafael F. Schaefer:
Multiple Noisy Private Remote Source Observations for Secure Function Computation. IACR Cryptol. ePrint Arch. 2022: 77 (2022) - [i57]Onur Günlü, Matthieu R. Bloch, Rafael F. Schaefer:
Secure Lossy Function Computation with Multiple Private Remote Source Observations. IACR Cryptol. ePrint Arch. 2022: 78 (2022) - [i56]Onur Günlü, Matthieu R. Bloch, Rafael F. Schaefer, Aylin Yener:
Secure Joint Communication and Sensing. IACR Cryptol. ePrint Arch. 2022: 221 (2022) - [i55]Laura Luzzi, Cong Ling, Matthieu R. Bloch:
Secret key generation from Gaussian sources using lattice-based extractors. IACR Cryptol. ePrint Arch. 2022: 808 (2022) - [i54]Onur Günlü, Matthieu R. Bloch, Rafael F. Schaefer, Aylin Yener:
Secure Integrated Sensing and Communication. IACR Cryptol. ePrint Arch. 2022: 1094 (2022) - 2021
- [j43]H. Vincent Poor, Matthieu R. Bloch, Onur Günlü, Frédérique E. Oggier, Lalitha Sankar, Rafael F. Schaefer, Aylin Yener:
Editorial. IEEE J. Sel. Areas Inf. Theory 2(1): 3-4 (2021) - [j42]Matthieu R. Bloch, Onur Günlü, Aylin Yener, Frédérique E. Oggier, H. Vincent Poor, Lalitha Sankar, Rafael F. Schaefer:
An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications. IEEE J. Sel. Areas Inf. Theory 2(1): 5-22 (2021) - [j41]Mehrdad Tahmasbi, Matthieu R. Bloch:
On Covert Quantum Sensing and the Benefits of Entanglement. IEEE J. Sel. Areas Inf. Theory 2(1): 352-365 (2021) - [j40]Meng-Che Chang, Matthieu R. Bloch:
Evasive Active Hypothesis Testing. IEEE J. Sel. Areas Inf. Theory 2(2): 735-746 (2021) - [j39]Hassan ZivariFard, Matthieu R. Bloch, Aria Nosratinia:
Two-Multicast Channel With Confidential Messages. IEEE Trans. Inf. Forensics Secur. 16: 2743-2758 (2021) - [j38]Shi-Yuan Wang, Matthieu R. Bloch:
Covert MIMO Communications Under Variational Distance Constraint. IEEE Trans. Inf. Forensics Secur. 16: 4605-4620 (2021) - [j37]Maël Le Treust, Matthieu R. Bloch:
State Leakage and Coordination With Causal State Knowledge at the Encoder. IEEE Trans. Inf. Theory 67(2): 805-823 (2021) - [j36]Rémi A. Chou, Matthieu R. Bloch, Aylin Yener:
Universal Covertness for Discrete Memoryless Sources. IEEE Trans. Inf. Theory 67(8): 5432-5442 (2021) - [c88]Onur Günlü, Matthieu R. Bloch, Rafael F. Schaefer:
Multiple Noisy Private Remote Source Observations for Secure Function Computation. ACSCC 2021: 690-697 - [c87]Gregory Canal, Matthieu R. Bloch, Christopher Rozell:
Feedback Coding for Active Learning. AISTATS 2021: 1468-1476 - [c86]Michael Enqi Cao, Matthieu R. Bloch, Samuel Coogan:
Estimating High Probability Reachable Sets using Gaussian Processes. CDC 2021: 3881-3886 - [c85]Nathan Blinn, Jana Boerger, Matthieu R. Bloch:
mmWave Beam Steering with Hierarchical Optimal Sampling for Unimodal Bandits. ICC 2021: 1-6 - [c84]Shi-Yuan Wang, Matthieu R. Bloch:
Explicit Design of Provably Covert Channel Codes. ISIT 2021: 190-195 - [c83]Meng-Che Chang, Matthieu R. Bloch:
Covert Authentication Against a Myopic Adversary. ISIT 2021: 196-201 - [c82]Hassan ZivariFard, Matthieu R. Bloch, Aria Nosratinia:
Covert Communication via Non-Causal Cribbing from a Cooperative Jammer. ISIT 2021: 202-207 - [c81]Mehrdad Tahmasbi, Boulat A. Bash, Saikat Guha, Matthieu R. Bloch:
Signaling for Covert Quantum Sensing. ISIT 2021: 1041-1045 - [c80]Onur Günlü, Matthieu R. Bloch, Rafael F. Schaefer:
Secure Multi-Function Computation with Private Remote Sources. ISIT 2021: 1403-1408 - [c79]Meng-Che Chang, Matthieu R. Bloch:
Covert Sequential Hypothesis Testing. ITW 2021: 1-6 - [c78]Uzi Pereg, Roberto Ferrara, Matthieu R. Bloch:
Key Assistance, Key Agreement, and Layered Secrecy for Bosonic Broadcast Channels. ITW 2021: 1-6 - [c77]Onur Günlü, Matthieu R. Bloch, Rafael F. Schaefer:
Secure Lossy Function Computation with Multiple Private Remote Source Observations. WSA 2021: 1-6 - [i53]Shi-Yuan Wang, Matthieu R. Bloch:
Covert MIMO Communications under Variational Distance Constraint. CoRR abs/2102.11336 (2021) - [i52]Gregory Canal, Matthieu R. Bloch, Christopher Rozell:
Feedback Coding for Active Learning. CoRR abs/2103.00654 (2021) - [i51]Uzi Pereg, Roberto Ferrara, Matthieu R. Bloch:
Key Assistance, Key Agreement, and Layered Secrecy for Bosonic Broadcast Channels. CoRR abs/2105.04033 (2021) - [i50]Onur Günlü, Matthieu R. Bloch, Rafael F. Schaefer:
Secure Multi-Function Computation with Private Remote Sources. CoRR abs/2106.09485 (2021) - [i49]Onur Günlü, Matthieu R. Bloch, Rafael F. Schaefer:
Private Remote Sources for Secure Multi-Function Computation. IACR Cryptol. ePrint Arch. 2021: 831 (2021) - 2020
- [j35]Mehrdad Tahmasbi, Matthieu R. Bloch:
Toward Undetectable Quantum Key Distribution Over Bosonic Channels. IEEE J. Sel. Areas Inf. Theory 1(2): 585-598 (2020) - [j34]Ekaterina Shipilova, Michel Barret, Matthieu R. Bloch, Jean-Luc Boelle, Jean-Luc Collette:
Simultaneous Seismic Sources Separation Based on Matrioshka Orthogonal Matching Pursuit, Application in Oil and Gas Exploration. IEEE Trans. Geosci. Remote. Sens. 58(7): 4529-4546 (2020) - [j33]Mehrdad Tahmasbi, Matthieu R. Bloch:
Covert Secret Key Generation With an Active Warden. IEEE Trans. Inf. Forensics Secur. 15: 1026-1039 (2020) - [j32]Mehrdad Tahmasbi, Matthieu R. Bloch, Aylin Yener:
Learning an Adversary's Actions for Secret Communication. IEEE Trans. Inf. Theory 66(3): 1607-1624 (2020) - [j31]Mehrdad Tahmasbi, Anne Savard, Matthieu R. Bloch:
Covert Capacity of Non-Coherent Rayleigh-Fading Channels. IEEE Trans. Inf. Theory 66(4): 1979-2005 (2020) - [j30]Giulia Cervia, Laura Luzzi, Maël Le Treust, Matthieu R. Bloch:
Strong Coordination of Signals and Actions Over Noisy Channels With Two-Sided State Information. IEEE Trans. Inf. Theory 66(8): 4681-4708 (2020) - [j29]Noha M. Helal, Matthieu R. Bloch, Aria Nosratinia:
Cooperative Resolvability and Secrecy in the Cribbing Multiple-Access Channel. IEEE Trans. Inf. Theory 66(9): 5429-5447 (2020) - [j28]Ishaque Ashar Kadampot, Mehrdad Tahmasbi, Matthieu R. Bloch:
Multilevel-Coded Pulse-Position Modulation for Covert Communications Over Binary-Input Discrete Memoryless Channels. IEEE Trans. Inf. Theory 66(10): 6001-6023 (2020) - [j27]Mehrdad Tahmasbi, Matthieu R. Bloch:
Covert and Secret Key Expansion Over Quantum Channels Under Collective Attacks. IEEE Trans. Inf. Theory 66(11): 7113-7131 (2020) - [c76]Alessia Benevento, María Santos, Giuseppe Notarstefano, Kamran Paynabar, Matthieu R. Bloch, Magnus Egerstedt:
Multi-Robot Coordination for Estimation and Coverage of Unknown Spatial Fields. ICRA 2020: 7740-7746 - [c75]Shi-Yuan Wang, Matthieu R. Bloch:
Covert MIMO Communications under Variational Distance Constraint. ISIT 2020: 828-833 - [c74]Hassan ZivariFard, Matthieu R. Bloch, Aria Nosratinia:
Keyless Covert Communication in the Presence of Channel State Information. ISIT 2020: 834-839 - [c73]Mehrdad Tahmasbi, Matthieu R. Bloch:
Active Covert Sensing. ISIT 2020: 840-845 - [c72]Noha M. Helal, Matthieu R. Bloch, Aria Nosratinia:
Resolvability of the Multiple Access Channel with Two-Sided Cooperation. ISIT 2020: 990-994 - [c71]Meng-Che Chang, Matthieu R. Bloch:
Evasive Active Hypothesis Testing. ISIT 2020: 1248-1253 - [i48]Qiaosheng Eric Zhang, Matthieu R. Bloch, Mayank Bakshi, Sidharth Jaggi:
Undetectable Radios: Covert Communication under Spectral Mask Constraints. CoRR abs/2001.01201 (2020) - [i47]Hassan ZivariFard, Matthieu R. Bloch, Aria Nosratinia:
Keyless Covert Communication via Channel State Information. CoRR abs/2003.03308 (2020) - [i46]Jingfan Sun, Suman Debnath, Matthieu R. Bloch, Maryam Saeedifard:
A Hybrid DC Fault Primary Protection Algorithm for Multi-Terminal HVdc Systems. CoRR abs/2006.16165 (2020) - [i45]Mehrdad Tahmasbi, Matthieu R. Bloch:
On Covert Quantum Sensing and the Benefits of Entanglement. CoRR abs/2008.01264 (2020)
2010 – 2019
- 2019
- [j26]Keerthi Suria Kumar Arumugam, Matthieu R. Bloch:
Embedding Covert Information in Broadcast Communications. IEEE Trans. Inf. Forensics Secur. 14(10): 2787-2801 (2019) - [j25]Mehrdad Tahmasbi, Matthieu R. Bloch:
First- and Second-Order Asymptotics in Covert Communication. IEEE Trans. Inf. Theory 65(4): 2190-2212 (2019) - [j24]Keerthi Suria Kumar Arumugam, Matthieu R. Bloch:
Covert Communication Over a K-User Multiple-Access Channel. IEEE Trans. Inf. Theory 65(11): 7020-7044 (2019) - [c70]Mehrdad Tahmasbi, Matthieu R. Bloch:
Covert Communication with Unknown Code at the Warden. Allerton 2019: 1060-1067 - [c69]Willie K. Harrison, Matthieu R. Bloch:
Attributes of Generators for Best Finite Blocklength Coset Wiretap Codes over Erasure Channels. ISIT 2019: 827-831 - [c68]Ishaque Ashar Kadampot, Mehrdad Tahmasbi, Matthieu R. Bloch:
Codes for Covert Communication over Additive White Gaussian Noise Channels. ISIT 2019: 977-981 - [c67]Qiaosheng Eric Zhang, Matthieu R. Bloch, Mayank Bakshi, Sidharth Jaggi:
Undetectable Radios: Covert Communication under Spectral Mask Constraints. ISIT 2019: 992-996 - [c66]Mehrdad Tahmasbi, Matthieu R. Bloch:
Steganography Protocols for Quantum Channels. ISIT 2019: 2179-2183 - [c65]Mehrdad Tahmasbi, Matthieu R. Bloch, Aylin Yener:
In-Band Sensing of the Adversary's Channel for Secure Communication in Wireless Channels. ISIT 2019: 2184-2188 - [c64]Noha M. Helal, Matthieu R. Bloch, Aria Nosratinia:
Channel Resolvability with a Full-Duplex Decode-and-Forward Relay. ITW 2019: 1-5 - [c63]Ishaque Ashar Kadampot, Matthieu R. Bloch:
Forward Reconciliation for Covert Key Generation. ITW 2019: 1-5 - [c62]Hassan ZivariFard, Matthieu R. Bloch, Aria Nosratinia:
Keyless Covert Communication in the Presence of Non-causal Channel State Information. ITW 2019: 1-5 - [i44]Mehrdad Tahmasbi, Matthieu R. Bloch:
Covert Secret Key Generation with an Active Warden. CoRR abs/1901.02044 (2019) - [i43]Hassan ZivariFard, Matthieu R. Bloch, Aria Nosratinia:
Secrecy Rates for a Channel With Two Senders and Two Receivers. CoRR abs/1902.08657 (2019) - [i42]Mehrdad Tahmasbi, Matthieu R. Bloch:
Security of Covert Quantum Key Distribution under a Class of Coherent Attacks. CoRR abs/1904.12363 (2019) - [i41]Mehrdad Tahmasbi, Matthieu R. Bloch:
Steganography Protocols for Quantum Channels. CoRR abs/1907.09602 (2019) - 2018
- [j23]Guillaume Freche, Matthieu R. Bloch, Michel Barret:
Polar Codes for Covert Communications over Asynchronous Discrete Memoryless Channels. Entropy 20(1): 3 (2018) - [j22]Badri N. Vellambi, Jörg Kliewer, Matthieu R. Bloch:
Strong Coordination Over Multi-Hop Line Networks Using Channel Resolvability Codebooks. IEEE Trans. Inf. Theory 64(2): 1132-1162 (2018) - [j21]Benjamin Larrousse, Samson Lasaulce, Matthieu R. Bloch:
Coordination in Distributed Networks via Coded Actions With Application to Power Control. IEEE Trans. Inf. Theory 64(5): 3633-3654 (2018) - [j20]Remi A. Chou, Matthieu R. Bloch, Jörg Kliewer:
Empirical and Strong Coordination via Soft Covering With Polar Codes. IEEE Trans. Inf. Theory 64(7): 5087-5100 (2018) - [c61]Willie K. Harrison, Matthieu R. Bloch:
On Dual Relationships of Secrecy Codes. Allerton 2018: 366-372 - [c60]Giulia Cervia, Laura Luzzi, Maël Le Treust, Matthieu R. Bloch:
Strong Coordination over Noisy Channels with Strictly Causal Encoding. Allerton 2018: 519-526 - [c59]Keerthi Suria Kumar Arumugam, Matthieu R. Bloch, Ligong Wang:
Covert Communication over a Physically Degraded Relay Channel with Non-Colluding Wardens. ISIT 2018: 766-770 - [c58]Ishaque Ashar Kadampot, Mehrdad Tahmasbi, Matthieu R. Bloch:
Multilevel-Coded Pulse-Position Modulation for Covert Communications. ISIT 2018: 1864-1868 - [c57]Noha M. Helal, Matthieu R. Bloch, Aria Nosratinia:
Multiple-Access Channel Resolvability with Cribbing. ISIT 2018: 2052-2056 - [i40]Giulia Cervia, Laura Luzzi, Maël Le Treust, Matthieu R. Bloch:
Strong coordination of signals and actions over noisy channels with two-sided state information. CoRR abs/1801.10543 (2018) - [i39]Giulia Cervia, Laura Luzzi, Maël Le Treust, Matthieu R. Bloch:
Polar codes for empirical coordination over noisy channels with strictly causal encoding. CoRR abs/1802.09795 (2018) - [i38]Keerthi Suria Kumar Arumugam, Matthieu R. Bloch:
Covert Communication over a K-User Multiple Access Channel. CoRR abs/1803.06007 (2018) - [i37]Mehrdad Tahmasbi, Matthieu R. Bloch, Aylin Yener:
Learning an Adversary's Actions for Secret Communication. CoRR abs/1807.08670 (2018) - [i36]Remi A. Chou, Matthieu R. Bloch, Aylin Yener:
Universal Covertness for Discrete Memoryless Sources. CoRR abs/1808.05612 (2018) - [i35]Keerthi Suria Kumar Arumugam, Matthieu R. Bloch:
Embedding Covert Information in Broadcast Communications. CoRR abs/1808.09556 (2018) - [i34]Giulia Cervia, Laura Luzzi, Maël Le Treust, Matthieu R. Bloch:
Strong Coordination over Noisy Channels with Strictly Causal Encoding. CoRR abs/1809.10934 (2018) - [i33]Mehrdad Tahmasbi, Anne Savard, Matthieu R. Bloch:
Covert Capacity of Non-Coherent Rayleigh-Fading Channels. CoRR abs/1810.07687 (2018) - [i32]Mehrdad Tahmasbi, Matthieu R. Bloch:
A framework for covert and secret key expansion over quantum channels. CoRR abs/1811.05626 (2018) - [i31]Ishaque Ashar Kadampot, Mehrdad Tahmasbi, Matthieu R. Bloch:
Multilevel-Coded Pulse-Position Modulation for Covert Communications over Binary-Input Discrete Memoryless Channels. CoRR abs/1811.09695 (2018) - [i30]Noha M. Helal, Matthieu R. Bloch, Aria Nosratinia:
Cooperative Resolvability and Secrecy in the Cribbing Multiple-Access Channel. CoRR abs/1811.11649 (2018) - [i29]Maël Le Treust, Matthieu R. Bloch:
State Leakage and Coordination of Actions: Core of the Receiver's Knowledge. CoRR abs/1812.07026 (2018) - 2017
- [j19]Remi A. Chou, Badri N. Vellambi, Matthieu R. Bloch, Jörg Kliewer:
Coding Schemes for Achieving Strong Secrecy at Negligible Cost. IEEE Trans. Inf. Theory 63(3): 1858-1873 (2017) - [c56]Hassan ZivariFard, Matthieu R. Bloch, Aria Nosratinia:
Two-transmitter two-receiver channel with confidential messages. Allerton 2017: 103-110 - [c55]Guillaume Freche, Matthieu R. Bloch, Michel Barret:
Polar codes for covert communications over asynchronous Discrete Memoryless Channels. CISS 2017: 1 - [c54]Mehrdad Tahmasbi, Matthieu R. Bloch:
Covert secret key generation. CNS 2017: 540-544 - [c53]Keerthi Suria Kumar Arumugam, Ishaque Ashar Kadampot, Mehrdad Tahmasbi, Shaswat Shah, Matthieu R. Bloch, Sebastian Pokutta:
Modulation recognition using side information and hybrid learning. DySPAN 2017: 1-2 - [c52]Ishaque Ashar Kadampot, Matthieu R. Bloch:
Coordination with clustered common randomness in a three-terminal line network. ISIT 2017: 1828-1832 - [c51]Mehrdad Tahmasbi, Matthieu R. Bloch, Aylin Yener:
Learning adversary's actions for secret communication. ISIT 2017: 2708-2712 - [c50]Matthieu R. Bloch, Saikat Guha:
Optimal covert communications using pulse-position modulation. ISIT 2017: 2825-2829 - [c49]Giulia Cervia, Laura Luzzi, Maël Le Treust, Matthieu R. Bloch:
Strong coordination of signals and actions over noisy channels. ISIT 2017: 2835-2839 - [c48]Keerthi Suria Kumar Arumugam, Matthieu R. Bloch:
Covert communication over broadcast channels. ITW 2017: 299-303 - [c47]Mehrdad Tahmasbi, Matthieu R. Bloch, Vincent Y. F. Tan:
Error exponent for covert communications over discrete memoryless channels. ITW 2017: 304-308 - [i28]Mehrdad Tahmasbi, Matthieu R. Bloch:
Second-Order Asymptotics in Covert Communication. CoRR abs/1703.01362 (2017) - [i27]Giulia Cervia, Laura Luzzi, Maël Le Treust, Matthieu R. Bloch:
Strong Coordination of Signals and Actions over Noisy Channels. CoRR abs/1705.05587 (2017) - [i26]Mary Ann Weitnauer, Jennifer Rexford, J. Nicholas Laneman, Matthieu R. Bloch, Santiago Griljava, Catherine Ross, Gee-Kung Chang:
Smart Wireless Communication is the Cornerstone of Smart Infrastructures. CoRR abs/1706.07363 (2017) - 2016
- [j18]Matthieu R. Bloch:
Covert Communication Over Noisy Channels: A Resolvability Perspective. IEEE Trans. Inf. Theory 62(5): 2334-2354 (2016) - [j17]Remi A. Chou, Matthieu R. Bloch:
Polar Coding for the Broadcast Channel With Confidential Messages: A Random Binning Analogy. IEEE Trans. Inf. Theory 62(5): 2410-2429 (2016) - [c46]Remi A. Chou, Matthieu R. Bloch, Aylin Yener:
Universal covertness for Discrete Memoryless Sources. Allerton 2016: 516-523 - [c45]Mehrdad Tahmasbi, Matthieu R. Bloch:
Second order asymptotics for degraded wiretap channels: How good are existing codes? Allerton 2016: 830-837 - [c44]Badri N. Vellambi, Jörg Kliewer, Matthieu R. Bloch:
Strong coordination over a line when actions are Markovian. CISS 2016: 412-417 - [c43]Badri N. Vellambi, Jörg Kliewer, Matthieu R. Bloch:
Lossy compression with near-uniform encoder outputs. ISIT 2016: 530-534 - [c42]Maël Le Treust, Matthieu R. Bloch:
Empirical coordination, state masking and state amplification: Core of the decoder's knowledge. ISIT 2016: 895-899 - [c41]Mehrdad Tahmasbi, Matthieu R. Bloch:
Second-order asymptotics of covert communications over noisy channels. ISIT 2016: 2224-2228 - [c40]Keerthi Suria Kumar Arumugam, Matthieu R. Bloch:
Keyless covert communication over Multiple-Access Channels. ISIT 2016: 2229-2233 - [c39]Giulia Cervia, Laura Luzzi, Matthieu R. Bloch, Maël Le Treust:
Polar coding for empirical coordination of signals and actions over noisy channels. ITW 2016: 81-85 - [c38]Keerthi Suria Kumar Arumugam, Matthieu R. Bloch:
Keyless asynchronous covert communication. ITW 2016: 191-195 - [i25]Badri N. Vellambi, Jörg Kliewer, Matthieu R. Bloch:
Lossy Compression with Near-uniform Encoder Outputs. CoRR abs/1602.06902 (2016) - [i24]Badri N. Vellambi, Jörg Kliewer, Matthieu R. Bloch:
Strong Coordination over Multi-hop Line Networks. CoRR abs/1602.09001 (2016) - [i23]Somayeh Salimi, Matthieu R. Bloch, Frederic Gabry, Mikael Skoglund, Panos Papadimitratos:
Strong Secrecy in Pairwise Key Agreement over a Generalized Multiple Access Channel. CoRR abs/1603.05399 (2016) - [i22]Remi A. Chou, Matthieu R. Bloch, Jörg Kliewer:
Empirical and Strong Coordination via Soft Covering with Polar Codes. CoRR abs/1608.08474 (2016) - [i21]Giulia Cervia, Laura Luzzi, Matthieu R. Bloch, Maël Le Treust:
Polar Coding for Empirical Coordination of Signals and Actions over Noisy Channels. CoRR abs/1609.06432 (2016) - 2015
- [j16]Matthieu R. Bloch, Masahito Hayashi, Andrew Thangaraj:
Error-Control Coding for Physical-Layer Secrecy. Proc. IEEE 103(10): 1725-1746 (2015) - [j15]Vincent Y. F. Tan, Matthieu R. Bloch:
Information Spectrum Approach to Strong Converse Theorems for Degraded Wiretap Channels. IEEE Trans. Inf. Forensics Secur. 10(9): 1891-1904 (2015) - [j14]Remi A. Chou, Matthieu R. Bloch, Emmanuel Abbe:
Polar Coding for Secret-Key Generation. IEEE Trans. Inf. Theory 61(11): 6213-6237 (2015) - [c37]Remi A. Chou, Matthieu R. Bloch:
Using deterministic decisions for low-entropy bits in the encoding and decoding of polar codes. Allerton 2015: 1380-1385 - [c36]Remi A. Chou, Matthieu R. Bloch, Jörg Kliewer:
Polar coding for empirical and strong coordination via distribution approximation. ISIT 2015: 1512-1516 - [c35]Badri N. Vellambi, Matthieu R. Bloch, Remi A. Chou, Jörg Kliewer:
Lossless and lossy source compression with near-uniform output: Is common randomness always required? ISIT 2015: 2171-2175 - [c34]Matthieu R. Bloch:
A channel resolvability perspective on stealth communications. ISIT 2015: 2535-2539 - [c33]Remi A. Chou, Matthieu R. Bloch:
Polar coding for the broadcast channel with confidential messages. ITW 2015: 1-5 - [c32]Badri N. Vellambi, Jörg Kliewer, Matthieu R. Bloch:
Strong coordination over multi-hop line networks. ITW Fall 2015: 192-196 - [i20]Benjamin Larrousse, Samson Lasaulce, Matthieu R. Bloch:
Coordination in distributed networks via coded actions with application to power control. CoRR abs/1501.03685 (2015) - [i19]Matthieu R. Bloch:
Covert Communication over Noisy Channels: A Resolvability Perspective. CoRR abs/1503.08778 (2015) - [i18]Remi A. Chou, Badri N. Vellambi, Matthieu R. Bloch, Jörg Kliewer:
Coding Schemes for Achieving Strong Secrecy at Negligible Cost. CoRR abs/1508.07920 (2015) - 2014
- [j13]Remi A. Chou, Matthieu R. Bloch:
Separation of Reliability and Secrecy in Rate-Limited Secret-Key Generation. IEEE Trans. Inf. Theory 60(8): 4941-4957 (2014) - [c31]Vincent Y. F. Tan, Matthieu R. Bloch:
Information spectrum approach to strong converse theorems for degraded wiretap channels. Allerton 2014: 747-754 - [c30]Remi A. Chou, Matthieu R. Bloch:
Uniform distributed source coding for the multiple access wiretap channel. CNS 2014: 127-132 - [c29]Remi A. Chou, Matthieu R. Bloch, Jörg Kliewer:
Low-complexity channel resolvability codes for the symmetric multiple-access channel. ITW 2014: 466-470 - [c28]Matthieu R. Bloch, Jörg Kliewer:
Strong coordination over a three-terminal relay network. ITW 2014: 646-650 - [i17]Vincent Y. F. Tan, Matthieu R. Bloch:
Information Spectrum Approach to Strong Converse Theorems for Degraded Wiretap Channels. CoRR abs/1406.6758 (2014) - [i16]Remi A. Chou, Matthieu R. Bloch:
Polar Coding for the Broadcast Channel with Confidential Messages and Constrained Randomization. CoRR abs/1411.0281 (2014) - 2013
- [j12]Matthieu R. Bloch, J. Nicholas Laneman:
Exploiting Partial Channel State Information for Secrecy over Wireless Channels. IEEE J. Sel. Areas Commun. 31(9): 1840-1849 (2013) - [j11]Raef Bassily, Ersen Ekrem, Xiang He, Ender Tekin, Jianwei Xie, Matthieu R. Bloch, Sennur Ulukus, Aylin Yener:
Cooperative Security at the Physical Layer: A Summary of Recent Advances. IEEE Signal Process. Mag. 30(5): 16-28 (2013) - [j10]Willie K. Harrison, João Almeida, Matthieu R. Bloch, Steven W. McLaughlin, João Barros:
Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security. IEEE Signal Process. Mag. 30(5): 41-50 (2013) - [j9]Francesco Renna, Matthieu R. Bloch, Nicola Laurenti:
Semi-Blind Key-Agreement over MIMO Fading Channels. IEEE Trans. Commun. 61(2): 620-627 (2013) - [j8]Matthieu R. Bloch, J. Nicholas Laneman:
Strong Secrecy From Channel Resolvability. IEEE Trans. Inf. Theory 59(12): 8077-8098 (2013) - [c27]Remi A. Chou, Matthieu R. Bloch:
Secret-key generation with arbitrarily varying eavesdropper's channel. GlobalSIP 2013: 277-280 - [c26]Remi A. Chou, Matthieu R. Bloch:
Data compression with nearly uniform output. ISIT 2013: 1979-1983 - [c25]Matthieu R. Bloch, Jörg Kliewer:
Strong coordination over a line network. ISIT 2013: 2319-2323 - [c24]Cong Ling, Laura Luzzi, Matthieu R. Bloch:
Secret key generation from Gaussian sources using lattice hashing. ISIT 2013: 2621-2625 - [c23]Remi A. Chou, Matthieu R. Bloch, Emmanuel Abbe:
Polar coding for secret-key generation. ITW 2013: 1-5 - [c22]Alexandre J. Pierrot, Matthieu R. Bloch:
Joint channel intrinsic randomness and channel resolvability. ITW 2013: 1-5 - [c21]Alexandre J. Pierrot, Remi A. Chou, Matthieu R. Bloch:
Experimental aspects of secret key generation in indoor wireless environments. SPAWC 2013: 669-673 - [i15]Francesco Renna, Nicola Laurenti, Stefano Tomasin, Marco Baldi, Nicola Maturo, Marco Bianchi, Franco Chiaraluce, Matthieu R. Bloch:
Low-power Secret-key Agreement over OFDM. CoRR abs/1302.4767 (2013) - [i14]Remi A. Chou, Matthieu R. Bloch, Emmanuel Abbe:
Polar Coding for Secret-Key Generation. CoRR abs/1305.4746 (2013) - [i13]Matthieu R. Bloch, Jörg Kliewer:
Strong Coordination over a Line Network. CoRR abs/1305.5992 (2013) - [i12]Cong Ling, Laura Luzzi, Matthieu R. Bloch:
Secret key generation from Gaussian sources using lattice hashing. CoRR abs/1306.5299 (2013) - [i11]Alexandre J. Pierrot, Remi A. Chou, Matthieu R. Bloch:
Practical Limitations of Secret-Key Generation in Narrowband Wireless Environments. CoRR abs/1312.3304 (2013) - 2012
- [j7]Matthieu R. Bloch, Mérouane Debbah, Yingbin Liang, Yasutada Oohama, Andrew Thangaraj:
Special issue on physical-layer security. J. Commun. Networks 14(4): 349-351 (2012) - [c20]Matthieu R. Bloch, Laura Luzzi, Jörg Kliewer:
Strong coordination with polar codes. Allerton Conference 2012: 565-571 - [c19]Matthieu R. Bloch, Jörg Kliewer:
On secure communication with constrained randomization. ISIT 2012: 1172-1176 - [c18]Remi A. Chou, Matthieu R. Bloch:
One-way rate-limited sequential key-distillation. ISIT 2012: 1777-1781 - [c17]Alexandre J. Pierrot, Matthieu R. Bloch:
LDPC-based coded cooperative jamming codes. ITW 2012: 462-466 - [i10]Matthieu R. Bloch, Jörg Kliewer:
On Secure Communication with Constrained Randomization. CoRR abs/1202.5529 (2012) - [i9]Matthieu R. Bloch, Laura Luzzi, Jörg Kliewer:
Strong Coordination with Polar Codes. CoRR abs/1210.2159 (2012) - [i8]Remi A. Chou, Matthieu R. Bloch:
Separation of Reliability and Secrecy in Rate-Limited Secret Key-Distillation. CoRR abs/1210.4482 (2012) - 2011
- [b2]Matthieu R. Bloch, João Barros:
Physical-Layer Security: From Information Theory to Security Engineering. Cambridge University Press 2011, ISBN 9780511977985 - [j6]João P. Vilela, Matthieu R. Bloch, João Barros, Steven W. McLaughlin:
Wireless Secrecy Regions With Friendly Jamming. IEEE Trans. Inf. Forensics Secur. 6(2): 256-266 (2011) - [j5]Arunkumar Subramanian, Andrew Thangaraj, Matthieu R. Bloch, Steven W. McLaughlin:
Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes. IEEE Trans. Inf. Forensics Secur. 6(3-1): 585-594 (2011) - [j4]Alexandre J. Pierrot, Matthieu R. Bloch:
Strongly Secure Communications Over the Two-Way Wiretap Channel. IEEE Trans. Inf. Forensics Secur. 6(3-1): 595-605 (2011) - [c16]Francesco Renna, Matthieu R. Bloch, Nicola Laurenti:
Semi-Blind Key-Agreement over MIMO Fading Channels. ICC 2011: 1-6 - [c15]Matthieu R. Bloch:
Achieving secrecy: Capacity vs. resolvability. ISIT 2011: 633-637 - [c14]Laura Luzzi, Matthieu R. Bloch:
Capacity-based random codes cannot achieve strong secrecy over symmetric wiretap channels. VALUETOOLS 2011: 641-647 - [i7]Matthieu R. Bloch, J. Nicholas Laneman:
Secrecy from Resolvability. CoRR abs/1105.5419 (2011) - 2010
- [c13]João P. Vilela, Matthieu R. Bloch, João Barros, Steven W. McLaughlin:
Friendly Jamming for Wireless Secrecy. ICC 2010: 1-6 - [c12]Matthieu R. Bloch:
Channel intrinsic randomness. ISIT 2010: 2607-2611 - [c11]Ananda Theertha Suresh, Arunkumar Subramanian, Andrew Thangaraj, Matthieu R. Bloch, Steven W. McLaughlin:
Strong secrecy for erasure wiretap channels. ITW 2010: 1-5 - [i6]Ananda Theertha Suresh, Arunkumar Subramanian, Andrew Thangaraj, Matthieu R. Bloch, Steven W. McLaughlin:
Strong Secrecy for Erasure Wiretap Channels. CoRR abs/1004.5540 (2010) - [i5]Arunkumar Subramanian, Andrew Thangaraj, Matthieu R. Bloch, Steven W. McLaughlin:
Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes. CoRR abs/1009.3130 (2010) - [i4]Alexandre J. Pierrot, Matthieu R. Bloch:
Strongly Secure Communications Over the Two-Way Wiretap Channel. CoRR abs/1010.0177 (2010)
2000 – 2009
- 2009
- [j3]Tan F. Wong, Matthieu R. Bloch, John M. Shea:
Secret Sharing over Fast-Fading MIMO Wiretap Channels. EURASIP J. Wirel. Commun. Netw. 2009 (2009) - [c10]Ebrahim MolavianJazi, Matthieu R. Bloch, J. Nicholas Laneman:
Arbitrary jamming can preclude secure communication. Allerton 2009: 1069-1075 - [c9]Matthieu R. Bloch:
Channel scrambling for secrecy. ISIT 2009: 2452-2456 - [c8]Brian P. Dunn, Matthieu R. Bloch, J. Nicholas Laneman:
Secure bits through queues. ITW 2009: 37-41 - 2008
- [b1]Matthieu R. Bloch:
Physical-layer security. Georgia Institute of Technology, Atlanta, GA, USA, 2008 - [j2]Matthieu R. Bloch, Rajesh Narasimha, Steven W. McLaughlin:
Network Security for Client-Server Architecture Using Wiretap Codes. IEEE Trans. Inf. Forensics Secur. 3(3): 404-413 (2008) - [j1]Matthieu R. Bloch, João Barros, Miguel R. D. Rodrigues, Steven W. McLaughlin:
Wireless Information-Theoretic Security. IEEE Trans. Inf. Theory 54(6): 2515-2534 (2008) - [c7]Matthieu R. Bloch, J. Nicholas Laneman:
On the secrecy capacity of arbitrary wiretap channels. Allerton 2008: 818-825 - [c6]João Barros, Matthieu R. Bloch:
Strong Secrecy for Wireless Channels (Invited Talk). ICITS 2008: 40-53 - [c5]Matthieu R. Bloch, Andrew Thangaraj:
Confidential messages to a cooperative relay. ITW 2008: 154-158 - 2007
- [c4]Sunil Kaimalettu, Andrew Thangaraj, Matthieu R. Bloch, Steven W. McLaughlin:
Constellation Shaping using LDPC Codes. ISIT 2007: 2366-2370 - 2006
- [c3]Matthieu R. Bloch, Andrew Thangaraj, Steven W. McLaughlin, Jean-Marc Merolla:
LDPC-based secret key agreement over the Gaussian wiretap channel. ISIT 2006: 1179-1183 - [c2]Matthieu R. Bloch, Andrew Thangaraj, Steven W. McLaughlin, Jean-Marc Merolla:
LDPC-based Gaussian key reconciliation. ITW 2006: 116-120 - [i3]Matthieu R. Bloch, João Barros, Miguel R. D. Rodrigues, Steven W. McLaughlin:
Wireless Information-Theoretic Security - Part I: Theoretical Aspects. CoRR abs/cs/0611120 (2006) - [i2]Matthieu R. Bloch, João Barros, Miguel R. D. Rodrigues, Steven W. McLaughlin:
Wireless Information-Theoretic Security - Part II: Practical Implementation. CoRR abs/cs/0611121 (2006) - 2005
- [i1]Matthieu R. Bloch, Andrew Thangaraj, Steven W. McLaughlin:
Efficient Reconciliation of Correlated Continuous Random Variables using LDPC Codes. CoRR abs/cs/0509041 (2005) - 2004
- [c1]Johann Cussey, Matthieu R. Bloch, Jean-Marc Merolla, Steven W. McLaughlin:
Integrated Direct-Modulation Based Quantum Cryptography System. OpNeTec 2004: 390-395
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 00:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint