Academic literature on the topic 'Adversarial Channels'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Adversarial Channels.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Adversarial Channels"
Suresh, Vinayak, Eric Ruzomberka, Chih-Chun Wang, and David J. Love. "Causal Adversarial Channels With Feedback Snooping." IEEE Journal on Selected Areas in Information Theory 3, no. 1 (March 2022): 69–84. http://dx.doi.org/10.1109/jsait.2022.3158230.
Full textWang, Pengwei, and Reihaneh Safavi-Naini. "A Model for Adversarial Wiretap Channels." IEEE Transactions on Information Theory 62, no. 2 (February 2016): 970–83. http://dx.doi.org/10.1109/tit.2015.2503766.
Full textSimon, Paul, Scott Graham, Christopher Talbot, and Micah Hayden. "Model for Quantifying the Quality of Secure Service." Journal of Cybersecurity and Privacy 1, no. 2 (May 7, 2021): 289–301. http://dx.doi.org/10.3390/jcp1020016.
Full textAnantharamu, Lakshmi, Bogdan S. Chlebus, and Mariusz A. Rokicki. "Adversarial Multiple Access Channels with Individual Injection Rates." Theory of Computing Systems 61, no. 3 (November 28, 2016): 820–50. http://dx.doi.org/10.1007/s00224-016-9725-x.
Full textPan, Xuran, Fan Yang, Lianru Gao, Zhengchao Chen, Bing Zhang, Hairui Fan, and Jinchang Ren. "Building Extraction from High-Resolution Aerial Imagery Using a Generative Adversarial Network with Spatial and Channel Attention Mechanisms." Remote Sensing 11, no. 8 (April 15, 2019): 917. http://dx.doi.org/10.3390/rs11080917.
Full textSafavi-Naini, Reihaneh, and Pengwei Wang. "A Model for Adversarial Wiretap Channels and its Applications." Journal of Information Processing 23, no. 5 (2015): 554–61. http://dx.doi.org/10.2197/ipsjjip.23.554.
Full textLeung, Debbie, and Graeme Smith. "Communicating Over Adversarial Quantum Channels Using Quantum List Codes." IEEE Transactions on Information Theory 54, no. 2 (February 2008): 883–87. http://dx.doi.org/10.1109/tit.2007.913433.
Full textChlebus, Bogdan S., Dariusz R. Kowalski, and Mariusz A. Rokicki. "Maximum throughput of multiple access channels in adversarial environments." Distributed Computing 22, no. 2 (August 27, 2009): 93–116. http://dx.doi.org/10.1007/s00446-009-0086-4.
Full textSutanto, Richard Evan, and Sukho Lee. "Real-Time Adversarial Attack Detection with Deep Image Prior Initialized as a High-Level Representation Based Blurring Network." Electronics 10, no. 1 (December 30, 2020): 52. http://dx.doi.org/10.3390/electronics10010052.
Full textAhlswede, Rudolf, Igor Bjelaković, Holger Boche, and Janis Nötzel. "Quantum Capacity under Adversarial Quantum Noise: Arbitrarily Varying Quantum Channels." Communications in Mathematical Physics 317, no. 1 (November 20, 2012): 103–56. http://dx.doi.org/10.1007/s00220-012-1613-x.
Full textDissertations / Theses on the topic "Adversarial Channels"
Akdemir, Kahraman D. "Error Detection Techniques Against Strong Adversaries." Digital WPI, 2010. https://digitalcommons.wpi.edu/etd-dissertations/406.
Full textGhoreishi, Madiseh Masoud. "Wireless secret key generation versus capable adversaries." Thesis, 2011. http://hdl.handle.net/1828/3766.
Full textGraduate
(11184744), Vinayak Suresh. "BINARY FEEDBACK IN COMMUNICATION SYSTEMS: BEAM ALIGNMENT, ADVERSARIES AND ENCODING." Thesis, 2021.
Find full text"Fundamental Limits of Gaussian Communication Networks in the Presence of Intelligent Jammers." Doctoral diss., 2019. http://hdl.handle.net/2286/R.I.55678.
Full textDissertation/Thesis
Doctoral Dissertation Electrical Engineering 2019
Book chapters on the topic "Adversarial Channels"
Anantharamu, Lakshmi, Bogdan S. Chlebus, Dariusz R. Kowalski, and Mariusz A. Rokicki. "Medium Access Control for Adversarial Channels with Jamming." In Structural Information and Communication Complexity, 89–100. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22212-2_9.
Full textLi, Ling-Long, Guang-Zhong Cao, Hong-Jie Liang, Jiang-Cheng Chen, and Yue-Peng Zhang. "EEG Generation of Virtual Channels Using an Improved Wasserstein Generative Adversarial Networks." In Intelligent Robotics and Applications, 386–99. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13841-6_36.
Full textAbate, Carmine, Roberto Blanco, Ștefan Ciobâcă, Adrien Durier, Deepak Garg, Cătălin Hrițcu, Marco Patrignani, Éric Tanter, and Jérémy Thibault. "Trace-Relating Compiler Correctness and Secure Compilation." In Programming Languages and Systems, 1–28. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-44914-8_1.
Full textAnantharamu, Lakshmi, Bogdan S. Chlebus, and Mariusz A. Rokicki. "Adversarial Multiple Access Channel with Individual Injection Rates." In Lecture Notes in Computer Science, 174–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10877-8_15.
Full textWang, Wei, Haifeng Hu, and Dihu Chen. "Channel and Constraint Compensation for Generative Adversarial Networks." In Pattern Recognition and Computer Vision, 386–97. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31654-9_33.
Full textRokka Chhetri, Sujit, and Mohammad Abdullah Al Faruque. "Data-Driven Security Analysis Using Generative Adversarial Networks." In Data-Driven Modeling of Cyber-Physical Systems using Side-Channel Analysis, 111–26. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-37962-9_6.
Full textDu, Zhenjiang, Ning Xie, Zhitao Liu, Xiaohua Zhang, and Yang Yang. "Twin-Channel Gan: Repair Shape with Twin-Channel Generative Adversarial Network and Structural Constraints." In Advances in Computer Graphics, 217–28. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89029-2_17.
Full textXie, Yingpeng, Qiwei Wan, Guozhen Chen, Yanwu Xu, and Baiying Lei. "Retinopathy Diagnosis Using Semi-supervised Multi-channel Generative Adversarial Network." In Ophthalmic Medical Image Analysis, 182–90. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-32956-3_22.
Full textMani, Pranav, E. S. Gopi, Hrishikesh Shekhar, and Sharan Chandra. "Generative Adversarial Network and Reinforcement Learning to Estimate Channel Coefficients." In Lecture Notes in Electrical Engineering, 49–58. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0289-4_4.
Full textGroza, Bogdan, and Marius Minea. "Bridging Dolev-Yao Adversaries and Control Systems with Time-Sensitive Channels." In Critical Information Infrastructures Security, 167–78. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-03964-0_15.
Full textConference papers on the topic "Adversarial Channels"
Suresh, Vinayak, Eric Ruzomberka, and David J. Love. "Stochastic-Adversarial Channels: Online Adversaries With Feedback Snooping." In 2021 IEEE International Symposium on Information Theory (ISIT). IEEE, 2021. http://dx.doi.org/10.1109/isit45174.2021.9517968.
Full textWang, Pengwei, Reihaneh Safavi-Naini, and Fuchun Lin. "Erasure adversarial wiretap channels." In 2015 53rd Annual Allerton Conference on Communication, Control and Computing (Allerton). IEEE, 2015. http://dx.doi.org/10.1109/allerton.2015.7447126.
Full textKosut, Oliver, and Jorg Kliewer. "Authentication Capacity of Adversarial Channels." In 2018 IEEE Information Theory Workshop (ITW). IEEE, 2018. http://dx.doi.org/10.1109/itw.2018.8613353.
Full textZhang, Yihan, Shashank Vatedka, Sidharth Jaggi, and Anand D. Sarwate. "Quadratically Constrained Myopic Adversarial Channels." In 2018 IEEE International Symposium on Information Theory (ISIT). IEEE, 2018. http://dx.doi.org/10.1109/isit.2018.8437457.
Full textBender, Michael A., Martin Farach-Colton, Simai He, Bradley C. Kuszmaul, and Charles E. Leiserson. "Adversarial contention resolution for simple channels." In the 17th annual ACM symposium. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1073970.1074023.
Full textAldawsari, Bader A., Bogdan S. Chlebus, and Dariusz R. Kowalski. "Broadcasting on Adversarial Multiple Access Channels." In 2019 IEEE 18th International Symposium on Network Computing and Applications (NCA). IEEE, 2019. http://dx.doi.org/10.1109/nca.2019.8935052.
Full textSafavi-Naini, Reihaneh, and Pengwei Wang. "Codes for limited view adversarial channels." In 2013 IEEE International Symposium on Information Theory (ISIT). IEEE, 2013. http://dx.doi.org/10.1109/isit.2013.6620229.
Full textSangwan, Neha, Mayank Bakshi, Bikash Kumar Dey, and Vinod M. Prabhakaran. "Multiple Access Channels with Adversarial Users." In 2019 IEEE International Symposium on Information Theory (ISIT). IEEE, 2019. http://dx.doi.org/10.1109/isit.2019.8849729.
Full textZhang, Yihan, Shashank Vatedka, and Sidharth Jaggi. "Quadratically Constrained Two-way Adversarial Channels." In 2020 IEEE International Symposium on Information Theory (ISIT). IEEE, 2020. http://dx.doi.org/10.1109/isit44484.2020.9174421.
Full textZhang, Yihan, Sidharth Jaggi, Michael Langberg, and Anand D. Sarwate. "The Capacity of Causal Adversarial Channels." In 2022 IEEE International Symposium on Information Theory (ISIT). IEEE, 2022. http://dx.doi.org/10.1109/isit50566.2022.9834709.
Full text