Quadratically constrained two-way adversarial channels
We study achievable rates of reliable communication in a power-constrained two-way
additive interference channel over the real alphabet where communication is disrupted by a …
additive interference channel over the real alphabet where communication is disrupted by a …
Multiple access channels with adversarial users
We study authenticated communication over two-user multiple access channels (MAC)
where one of the users is possibly adversarial. When both users behave non-adversarially …
where one of the users is possibly adversarial. When both users behave non-adversarially …
Multiple access channels with byzantine users
Communication over a three-user multiple access channel (MAC) is studied when any one
of the users may behave adversarially. The capacity region is characterized for randomized …
of the users may behave adversarially. The capacity region is characterized for randomized …
Authentication and partial message correction over adversarial multiple-access channels
In this paper, we present results on the authentication capacity region for the two-user
arbitrarily-varying multipleaccess channel. We first consider a standard definition of …
arbitrarily-varying multipleaccess channel. We first consider a standard definition of …
The capacity region of the arbitrarily varying MAC: with and without constraints
U Pereg, Y Steinberg - 2019 IEEE International Symposium on …, 2019 - ieeexplore.ieee.org
We determine both the random code capacity region and the deterministic code capacity
region of the arbitrarily varying multiple access channel (AVMAC) under input and state …
region of the arbitrarily varying multiple access channel (AVMAC) under input and state …