关注
Boulat Bash
Boulat Bash
Assistant Professor, ECE Department, University of Arizona
在 email.arizona.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Limits of reliable communication with low probability of detection on AWGN channels
BA Bash, D Goeckel, D Towsley
IEEE Journal on Selected Areas in Communications 31 (9), 1921-1930, 2013
7452013
Covert communication in the presence of an uninformed jammer
TV Sobers, BA Bash, S Guha, D Towsley, D Goeckel
IEEE Transactions on Wireless Communications 16 (9), 6193-6206, 2017
3542017
Hiding information in noise: Fundamental limits of covert wireless communication
BA Bash, D Goeckel, D Towsley, S Guha
IEEE Communications Magazine 53 (12), 26-31, 2015
3212015
Covert wireless communication with artificial noise generation
R Soltani, D Goeckel, D Towsley, B Bash, S Guha
IEEE Transactions on Wireless Communications, 2018
1622018
Covert communications when the warden does not know the background noise power
D Goeckel, B Bash, S Guha, D Towsley
IEEE Communications Letters 20 (2), 236-239, 2015
1362015
Covert Communication Gains from Adversary's Ignorance of Transmission Time
B Bash, D Goeckel, D Towsley
IEEE Transactions on Wireless Communications, 2016
1292016
Exact distributed Voronoi cell computation in sensor networks
BA Bash, PJ Desnoyers
Proceedings of the 6th international conference on Information processing in …, 2007
1132007
Quantum-secure covert communication on bosonic channels
BA Bash, AH Gheorghe, M Patel, JL Habif, D Goeckel, D Towsley, S Guha
Nature communications 6, 8626, 2015
1102015
Square root law for communication with low probability of detection on AWGN channels
BA Bash, D Goeckel, D Towsley
2012 IEEE International Symposium on Information Theory Proceedings, 448-452, 2012
1072012
LPD communication when the warden does not know when
BA Bash, D Goeckel, D Towsley
2014 IEEE International Symposium on Information Theory, 606-610, 2014
902014
Multi-hop routing in covert wireless networks
A Sheikholeslami, M Ghaderi, D Towsley, BA Bash, S Guha, D Goeckel
IEEE Transactions on Wireless Communications 17 (6), 3656-3669, 2018
762018
Approximately uniform random sampling in sensor networks
BA Bash, JW Byers, J Considine
Proceeedings of the 1st international workshop on Data management for sensor …, 2004
702004
Covert single-hop communication in a wireless network with distributed artificial noise generation
R Soltani, B Bash, D Goeckel, S Guha, D Towsley
2014 52nd Annual Allerton Conference on communication, control, and …, 2014
572014
Covert communication over classical-quantum channels
A Sheikholeslami, BA Bash, D Towsley, D Goeckel, S Guha
2016 IEEE International Symposium on Information Theory (ISIT), 2064-2068, 2016
462016
Fundamental limits of quantum-secure covert communication over bosonic channels
MS Bullock, CN Gagatsos, S Guha, BA Bash
IEEE Journal on Selected Areas in Communications 38 (3), 471-482, 2020
372020
Covert communication with the help of an uninformed jammer achieves positive rate
TV Sobers, BA Bash, D Goeckel, S Guha, D Towsley
2015 49th Asilomar Conference on Signals, Systems and Computers, 625-629, 2015
372015
Infinite-fold enhancement in communications capacity using pre-shared entanglement
S Guha, Q Zhuang, BA Bash
2020 IEEE International Symposium on Information Theory (ISIT), 1835-1839, 2020
292020
Covert Capacity of Bosonic Channels
CN Gagatsos, MS Bullock, BA Bash
IEEE Journal on Selected Areas in Information Theory 1 (2), 555-567, 2020
242020
Post-IPO Flipping and Turnover: Predictive Factors for Long-Run Returns
B Bash
Available at SSRN 620164, 2001
232001
Quantum noise limited optical communication with low probability of detection
BA Bash, S Guha, D Goeckel, D Towsley
2013 IEEE International Symposium on Information Theory, 1715-1719, 2013
212013
系统目前无法执行此操作,请稍后再试。
文章 1–20