default search action
Willie K. Harrison
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c36]Willie K. Harrison, John L. Salmon:
WAR Accumulation Differential: A Statistic for Identifying Undervalued Players. ISACE 2024: 60-74 - [c35]Darren Rowe, Willie K. Harrison, John L. Salmon:
The Two-Point Dilemma: Does Going for Two Win Close Football Games? ISACE 2024: 190-201 - [c34]Darren Rowe, John L. Salmon, Willie K. Harrison:
How to Analyze Coaching: This is the WAE. ISACE 2024: 202-215 - [i10]Ali Nikkhah, Morteza Shoushtari, Bahareh Akhbari, Willie K. Harrison:
Secrecy Coding for the Binary Symmetric Wiretap Channel via Linear Programming. CoRR abs/2401.07141 (2024) - [i9]David Hunn, Willie K. Harrison:
Subspace Decomposition of Coset Codes. CoRR abs/2402.09673 (2024) - [i8]David Hunn, Willie K. Harrison:
Optimizing Secrecy Codes Using Gradient Descent. CoRR abs/2405.15935 (2024) - 2023
- [j14]Daniel Harman, Karl Knapp, Tyler Sweat, Philip Lundrigan, Michael Rice, Willie K. Harrison:
Physical Layer Security: Channel Sounding Results for the Multi-Antenna Wiretap Channel. Entropy 25(10): 1397 (2023) - [j13]Morteza Shoushtari, Willie K. Harrison:
Optimizing Finite-Blocklength Nested Linear Secrecy Codes: Using the Worst Code to Find the Best Code. Entropy 25(10): 1456 (2023) - [j12]Carlos A. Gutiérrez, Willie K. Harrison, Michael Rice, Benjamin Jensen, Kalin Norman, Bryan Redd, Autumn Twitchell, Marco Cardenas-Juarez:
Envelope distribution and Doppler spectrum of V2V channels at 5.9 GHz in mountainous roads. Veh. Commun. 39: 100570 (2023) - 2022
- [j11]Chad Josephson, Spencer Giddens, Erik Perrins, Willie K. Harrison, Michael Rice:
Estimators for Space-Time Block-Coded ARTM CPM in Aeronautical Mobile Telemetry. IEEE Trans. Aerosp. Electron. Syst. 58(4): 3353-3369 (2022) - [c33]David Hunn, Willie K. Harrison:
Subspace Decomposition of Extreme-Rate Secrecy Codes. ISIT 2022: 1235-1240 - 2021
- [j10]André Silva, Marco Gomes, João P. Vilela, Willie K. Harrison:
SDR Proof-of-Concept of Full-Duplex Jamming for Enhanced Physical Layer Security. Sensors 21(3): 856 (2021) - [c32]Spencer Giddens, Marco A. C. Gomes, João P. Vilela, José Luís Santos, Willie K. Harrison:
Enumeration of the Degree Distribution Space for Finite Block Length LDPC Codes. ICC 2021: 1-6 - [c31]Thyago M. S. Pinto, João P. Vilela, Marco A. C. Gomes, Willie K. Harrison:
Keyed Polar Coding for Physical-Layer Security without Channel State Information. ICC 2021: 1-6 - [c30]Morteza Shoushtari, Willie K. Harrison:
New Dual Relationships for Error-Correcting Wiretap Codes. ITW 2021: 1-6 - [c29]Willie K. Harrison, Morteza Shoushtari:
On Caching with Finite Blocklength Coding for Secrecy over the Binary Erasure Wiretap Channel. WTS 2021: 1-6 - 2020
- [j9]Willie K. Harrison:
Exact Equivocation Expressions for Wiretap Coding Over Erasure Channel Models. IEEE Commun. Lett. 24(12): 2687-2691 (2020) - [j8]Michael Rice, Bradford Clark, Dakota Flanary, Benjamin Jensen, Nathan Nelson, Kalin Norman, Ethan Perrins, Willie K. Harrison:
Physical-Layer Security for Vehicle-to-Everything Networks: Increasing Security While Maintaining Reliable Communications. IEEE Veh. Technol. Mag. 15(3): 68-76 (2020) - [c28]André Silva, Marco A. C. Gomes, João P. Vilela, Willie K. Harrison:
SDR Testbed of Full-Duplex Jamming for Secrecy. CSNDSP 2020: 1-3 - [c27]Matthew H. Johnson, Willie K. Harrison:
Comparison of Latency with Selective Repeat and Rateless Coding in Delayed Feedback Systems. ICNC 2020: 102-106
2010 – 2019
- 2019
- [j7]Willie K. Harrison, Elise Beard, Scott Dye, Erin Holmes, Kaela Nelson, Marco A. C. Gomes, João P. Vilela:
Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach. Entropy 21(8): 755 (2019) - [j6]Willie K. Harrison, Telmo R. Fernandes, Marco A. C. Gomes, João P. Vilela:
Generating a Binary Symmetric Channel for Wiretap Codes. IEEE Trans. Inf. Forensics Secur. 14(8): 2128-2138 (2019) - [c26]Hunter Searle, Marco A. C. Gomes, João P. Vilela, Willie K. Harrison:
Irregular Quadrature Amplitude Modulation for Adaptive Physical-Layer Security. GLOBECOM 2019: 1-6 - [c25]Miguel Carreira, Thyago Monteiro, Marco Gomes, João P. Vilela, Willie K. Harrison:
Adaptive Physical-Layer Security Through Punctured Coding for Secrecy. ICC 2019: 1-6 - [c24]Zachary Dryer, Adam Nickerl, Marco A. C. Gomes, João P. Vilela, Willie K. Harrison:
Full-Duplex Jamming for Enhanced Hidden-Key Secrecy. ICC 2019: 1-7 - [c23]Benjamin Jensen, Bradford Clark, Dakota Flanary, Kalin Norman, Michael Rice, Willie K. Harrison:
Physical-Layer Security: Does it Work in a Real Environment? ICC 2019: 1-7 - [c22]Dakota Flanary, Benjamin Jensen, Bradford Clark, Kalin Norman, Nathan Nelson, Michael Rice, Willie K. Harrison:
Manufacturing an Erasure Wiretap Channel from Channel Sounding Measurements. ISIT 2019: 320-324 - [c21]Willie K. Harrison, Matthieu R. Bloch:
Attributes of Generators for Best Finite Blocklength Coset Wiretap Codes over Erasure Channels. ISIT 2019: 827-831 - [c20]Carlos A. Gutiérrez, Willie K. Harrison, Michael Rice:
V2V Propagation in Mountainous Terrain: Part II - Modeling Results. LATINCOM 2019: 1-6 - [c19]Michael Rice, Willie K. Harrison, Benjamin Jensen, Kalin Norman, Brett Wood, Carlos A. Gutiérrez:
V2V Propagation in Mountainous Terrain: Part I - Experimental Configuration and Measurement Results. LATINCOM 2019: 1-6 - [c18]Thyago M. S. Pinto, Marco Gomes, João P. Vilela, Willie K. Harrison:
Polar Coding for Physical-Layer Security without Knowledge of the Eavesdropper's Channel. VTC Spring 2019: 1-5 - 2018
- [j5]Willie K. Harrison, Dinis Sarmento, João P. Vilela, Marco A. C. Gomes:
Analysis of short blocklength codes for secrecy. EURASIP J. Wirel. Commun. Netw. 2018: 255 (2018) - [c17]Willie K. Harrison, Matthieu R. Bloch:
On Dual Relationships of Secrecy Codes. Allerton 2018: 366-372 - [c16]Matthew H. Johnson, Willie K. Harrison:
A Rateless Approach to Physical-Layer Security. ICC 2018: 1-6 - [c15]Gregory T. Rendon, Willie K. Harrison, Marco A. C. Gomes, João P. Vilela:
Nested QPSK Encoding for Information Theoretic Security. ICC 2018: 1-6 - [c14]Farah Arabian, Willie K. Harrison, Chad Josephson, Michael Rice, Erik Perrins:
On Peak-to-Average Power Ratio Optimization for Coded APSK. ISWCS 2018: 1-6 - [c13]Parker Boyce, Willie K. Harrison:
Cryptanalysis of Lempel-Ziv Compressed and Encrypted Text: The Statistics of Compression. ISWCS 2018: 1-6 - [c12]Gregory Larmore, Willie K. Harrison:
Active Topology Inference in Store, Code, and Forward Networks. ISWCS 2018: 1-6 - [i7]Benjamin Jensen, Bradford Clark, Dakota Flanary, Kalin Norman, Michael Rice, Willie K. Harrison:
Physical-Layer Security: Does it Work in a Real Environment? CoRR abs/1811.06591 (2018) - 2017
- [c11]Jack Pfister, Marco A. C. Gomes, João P. Vilela, Willie K. Harrison:
Quantifying equivocation for finite blocklength wiretap codes. ICC 2017: 1-6 - [i6]Jack Pfister, Marco A. C. Gomes, João P. Vilela, Willie K. Harrison:
Quantifying Equivocation for Finite Blocklength Wiretap Codes. CoRR abs/1701.05484 (2017) - 2016
- [j4]Willie K. Harrison:
The Role of Graph Theory in System of Systems Engineering. IEEE Access 4: 1716-1742 (2016) - [j3]João P. Vilela, Marco Gomes, Willie K. Harrison, Dinis Sarmento, Fabio Dias:
Interleaved Concatenated Coding for Secrecy in the Finite Blocklength Regime. IEEE Signal Process. Lett. 23(3): 356-360 (2016) - 2015
- [c10]Sam Schmidt, Willie K. Harrison:
Real-time rate-adaptable coding for fading channels. SP/SPE 2015: 151-156 - [c9]Dinis Sarmento, João P. Vilela, Willie K. Harrison, Marco Gomes:
Interleaved Coding for Secrecy with a Hidden Key. GLOBECOM Workshops 2015: 1-6 - [i5]Willie K. Harrison, Dinis Sarmento, João P. Vilela, Marco Gomes:
Analysis of Short Blocklength Codes for Secrecy. CoRR abs/1509.07092 (2015) - 2014
- [c8]Willie K. Harrison, Parker Boyce:
Parity modifications and stopping sets in high-rate codes for physical-layer security. CNS 2014: 115-120 - [c7]Nathan L. Gross, Willie K. Harrison:
An analysis of an HMM-based attack on the substitution cipher with error-prone ciphertext. ICC 2014: 749-754 - 2013
- [j2]Willie K. Harrison, João Almeida, Matthieu R. Bloch, Steven W. McLaughlin, João Barros:
Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security. IEEE Signal Process. Mag. 30(5): 41-50 (2013) - [c6]Willie K. Harrison:
Coset codes in a multi-hop network. GLOBECOM Workshops 2013: 1270-1274 - 2012
- [b1]Willie K. Harrison:
Physical-layer security: practical aspects of channel coding and cryptography. Georgia Institute of Technology, Atlanta, GA, USA, 2012 - [c5]Willie K. Harrison, João Paulo A. Almeida, Steven W. McLaughlin, João Barros:
Physical-layer security over correlated erasure channels. ICC 2012: 888-892 - [c4]Willie K. Harrison, Steven W. McLaughlin:
Equivocations for the simple substitution cipher with erasure-prone ciphertext. ITW 2012: 622-626 - 2011
- [j1]Willie K. Harrison, João Almeida, Steven W. McLaughlin, João Barros:
Coding for Cryptographic Security Enhancement Using Stopping Sets. IEEE Trans. Inf. Forensics Secur. 6(3-1): 575-584 (2011) - [i4]Willie K. Harrison, João Almeida, Steven W. McLaughlin, João Barros:
Coding for Cryptographic Security Enhancement using Stopping Sets. CoRR abs/1102.3173 (2011) - [i3]Willie K. Harrison, João Almeida, Steven W. McLaughlin, João Barros:
Physical-Layer Security over Correlated Erasure Channels. CoRR abs/1102.3641 (2011) - 2010
- [c3]Willie K. Harrison, João Almeida, Demijan Klinc, Steven W. McLaughlin, João Barros:
Stopping sets for physical-layer security. ITW 2010: 1-5
2000 – 2009
- 2009
- [c2]Willie K. Harrison, Steven W. McLaughlin:
Physical-Layer Security: Combining Error Control Coding and Cryptography. ICC 2009: 1-5 - [c1]Willie K. Harrison, Steven W. McLaughlin:
Tandem coding and cryptography on wiretap channels: EXIT chart analysis. ISIT 2009: 1939-1943 - [i2]Willie K. Harrison, Steven W. McLaughlin:
Physical-Layer Security: Combining Error Control Coding and Cryptography. CoRR abs/0901.0275 (2009) - [i1]Willie K. Harrison, Steven W. McLaughlin:
Tandem Coding and Cryptography on Wiretap Channels: EXIT Chart Analysis. CoRR abs/0905.0440 (2009)
Coauthor Index
aka: Marco A. C. Gomes
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint