Quadratically constrained two-way adversarial channels

Y Zhang, S Vatedka, S Jaggi - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
We study achievable rates of reliable communication in a power-constrained two-way
additive interference channel over the real alphabet where communication is disrupted by a …

Multiple access channels with adversarial users

N Sangwan, M Bakshi, BK Dey… - … on Information Theory …, 2019 - ieeexplore.ieee.org
We study authenticated communication over two-user multiple access channels (MAC)
where one of the users is possibly adversarial. When both users behave non-adversarially …

Multiple access channels with byzantine users

N Sangwan, M Bakshi, BK Dey… - 2019 IEEE …, 2019 - ieeexplore.ieee.org
Communication over a three-user multiple access channel (MAC) is studied when any one
of the users may behave adversarially. The capacity region is characterized for randomized …

Authentication and partial message correction over adversarial multiple-access channels

A Beemer, E Graves, J Kliewer… - 2020 IEEE Conference …, 2020 - ieeexplore.ieee.org
In this paper, we present results on the authentication capacity region for the two-user
arbitrarily-varying multipleaccess channel. We first consider a standard definition of …

The capacity region of the arbitrarily varying MAC: with and without constraints

U Pereg, Y Steinberg - 2019 IEEE International Symposium on …, 2019 - ieeexplore.ieee.org
We determine both the random code capacity region and the deterministic code capacity
region of the arbitrarily varying multiple access channel (AVMAC) under input and state …