Radar remote monitoring of vital signs C Li, J Cummings, J Lam, E Graves, W Wu Microwave Magazine, IEEE 10 (1), 47-56, 2009 | 298 | 2009 |
Keyless authentication in the presence of a simultaneously transmitting adversary E Graves, P Yu, P Spasojevic 2016 IEEE Information Theory Workshop (ITW), 201-205, 2016 | 15 | 2016 |
A coding approach to guarantee information integrity against a Byzantine relay E Graves, TF Wong 2013 IEEE International Symposium on Information Theory, 2780-2784, 2013 | 13 | 2013 |
Detection of channel degradation attack by Intermediary Node in Linear Networks E Graves, TF Wong INFOCOM, 2012 Proceedings IEEE, 747-755, 2012 | 13 | 2012 |
Inner bound for the capacity region of noisy channels with an authentication requirement J Perazzone, E Graves, P Yu, R Blum 2018 IEEE International Symposium on Information Theory (ISIT), 126-130, 2018 | 12 | 2018 |
Inducing information stability to obtain information theoretic necessary requirements E Graves, TF Wong IEEE Transactions on Information Theory, 2019 | 11* | 2019 |
Detecting substitution attacks against non-colluding relays R Cao, E Graves, TF Wong, T Lv Global Communications Conference (GLOBECOM), 2013 IEEE, 1856-1861, 2013 | 11 | 2013 |
Authentication Against a Myopic Adversary A Beemer, O Kosut, J Kliewer, E Graves, P Yu 2019 IEEE Conference on Communications and Network Security (CNS), 1-5, 2019 | 10 | 2019 |
Detectability of Symbol Manipulation by an Amplify-and-Forward Relay E Graves, T Wong arXiv preprint arXiv:1205.2681, 2012 | 10 | 2012 |
Authentication and Partial Message Correction over Adversarial Multiple-Access Channels A Beemer, E Graves, J Kliewer, O Kosut, P Yu 2020 IEEE Conference on Communications and Network Security (CNS), 1-6, 2020 | 8 | 2020 |
Structured Coding for Authentication in the Presence of a Malicious Adversary A Beemer, O Kosut, J Kliewer, E Graves, P Yu 2019 IEEE International Symposium on Information Theory (ISIT), 617-621, 2019 | 8 | 2019 |
Authentication with Mildly Myopic Adversaries A Beemer, E Graves, J Kliewer, O Kosut, P Yu 2020 IEEE International Symposium on Information Theory (ISIT), 984-989, 2020 | 5 | 2020 |
Secret sharing in fast fading channels using obfuscated incremental-redundancy hybrid ARQ CW Wong, E Graves, JM Shea, TF Wong Military Communications Conference, 2009. MILCOM 2009. IEEE, 1-7, 2009 | 5 | 2009 |
Messages per secret bit when authentication and a min-entropy secrecy criterion are required E Graves, B Kirby, P Yu 2017 51st Annual Conference on Information Sciences and Systems (CISS), 1-6, 2017 | 4 | 2017 |
Wiretap channel capacity: Secrecy criteria, strong converse, and phase change E Graves, TF Wong arXiv preprint arXiv:1701.07347, 2017 | 4 | 2017 |
Equating the achievable exponent region to the achievable entropy region by partitioning the source E Graves, TF Wong 2014 IEEE International Symposium on Information Theory, 1346-1350, 2014 | 4 | 2014 |
Estimating Link Packet Rates From Partial CSMA/CA Network Observations Y Cheng, E Graves, A Swami, A Sabharwal 2021 55th Asilomar Conference on Signals, Systems, and Computers, 772-779, 2021 | 3 | 2021 |
Information stabilization of images over discrete memoryless channels E Graves, TF Wong 2016 IEEE International Symposium on Information Theory (ISIT), 2619-2623, 2016 | 3 | 2016 |
Adaptive Monitoring for Analytics Placement in Tactical Networks J Corcoran, E Graves, B Dawson, M Dwyer, P Yu, K Chan MILCOM 2022-2022 IEEE Military Communications Conference (MILCOM), 926-931, 2022 | 2 | 2022 |
Secret Key-Enabled Authenticated-Capacity Region, Part II: Typical-Authentication E Graves, JB Perazzone, P Yu, R Blum IEEE Transactions on Information Theory, 2022 | 2* | 2022 |