关注
Ashish Khisti
Ashish Khisti
在 comm.utoronto.ca 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A simple cooperative diversity method based on network path selection
A Bletsas, A Khisti, DP Reed, A Lippman
IEEE Journal on selected areas in communications 24 (3), 659-672, 2006
37792006
Secure transmission with multiple antennas—Part I: The MISOME wiretap channel
A Khisti, W G
IEEE Transactions on Information Theory 56 (7), 3088-3104, 2010
17632010
Secure transmission with multiple antennas I: The MISOME wiretap channel
A Khisti, GW Wornell
Information Theory, IEEE Transactions on 56 (7), 3088-3104, 2010
1763*2010
A survey of physical layer security techniques for 5G wireless networks and challenges ahead
Y Wu, A Khisti, C Xiao, G Caire, KK Wong, X Gao
IEEE Journal on Selected Areas in Communications 36 (4), 679-695, 2018
7842018
Secure broadcasting over fading channels
A Khisti, A Tchamkerten, GW Wornell
IEEE transactions on information theory 54 (6), 2453-2469, 2008
2962008
On the Gaussian MIMO wiretap channel
A Khisti, G Wornell, A Wiesel, Y Eldar
2007 IEEE International Symposium on Information Theory, 2471-2475, 2007
2562007
QoE-driven cache management for HTTP adaptive bit rate streaming over wireless networks
W Zhang, Y Wen, Z Chen, A Khisti
IEEE transactions on multimedia 15 (6), 1431-1445, 2013
2452013
Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage
D Varodayan, A Khisti
2011 IEEE International Conference on Acoustics, Speech and Signal …, 2011
1872011
Lattice strategies for the dirty multiple access channel
T Philosof, R Zamir, U Erez, AJ Khisti
IEEE Transactions on Information Theory 57 (8), 5006-5035, 2011
1582011
Information-theoretic generalization bounds for SGLD via data-dependent estimates
J Negrea, M Haghifam, GK Dziugaite, A Khisti, DM Roy
Advances in Neural Information Processing Systems 32, 2019
1462019
Using distributed source coding to secure fingerprint biometrics
SC Draper, A Khisti, E Martinian, A Vetro, JS Yedidia
2007 IEEE International Conference on Acoustics, Speech and Signal …, 2007
1452007
Biometric based user authentication and data encryption
SC Draper, A Khisti, E Martinian, A Vetro, JS Yedidia
US Patent 7,779,268, 2010
1392010
Opportunistic cooperative diversity with feedback and cheap radios
A Bletsas, A Khisti, MZ Win
IEEE Transactions on Wireless Communications 7 (5), 1823-1827, 2008
1192008
The MIMOME channel
A Khisti, G Wornell
arXiv preprint arXiv:0710.1325, 2007
1162007
Sharpened generalization bounds based on conditional mutual information and an application to noisy, iterative algorithms
M Haghifam, J Negrea, A Khisti, DM Roy, GK Dziugaite
Advances in Neural Information Processing Systems 33, 9925-9935, 2020
1082020
Layered constructions for low-delay streaming codes
A Badr, P Patil, A Khisti, WT Tan, J Apostolopoulos
IEEE Transactions on Information Theory 63 (1), 111-141, 2016
1052016
Variational model inversion attacks
KC Wang, Y Fu, K Li, A Khisti, R Zemel, A Makhzani
Advances in Neural Information Processing Systems 34, 9706-9719, 2021
942021
Interference alignment for the multiantenna compound wiretap channel
A Khisti
IEEE Transactions on Information Theory 57 (5), 2976-2993, 2011
832011
Secret-key generation using correlated sources and channels
A Khisti, SN Diggavi, GW Wornell
IEEE Transactions on Information Theory 58 (2), 652-670, 2012
782012
Information-theoretic privacy for smart metering systems with a rechargeable battery
S Li, A Khisti, A Mahajan
IEEE Transactions on Information Theory 64 (5), 3679-3695, 2018
652018
系统目前无法执行此操作,请稍后再试。
文章 1–20