Conference, Symposium, and Workshop Papers

Under Submission

  1. Joint Active and Passive Secure Precoding in IRS-Aided MIMO Systems
    S. Assad, Y. Wu, A. Bereyhi, R. R. Müller, R. F. Schaefer, and H. V. Poor
    IEEE Global Communications Conference (GLOBECOM ’21), Madrid, Spain, Dec. 2021.

  2. Multiple Private Remote Source Observations for Secure Function Computation
    O. Günlü, M. Bloch, and R. F. Schaefer
    55th Annual Asilomar Conference on Signals, Systems, and Computers (ACSSC ’21), Pacific Grove, CA, USA, Oct. 2021.

  3. Secure Multi-Function Computation with Private Remote Sources
    O. Günlü, M. Bloch, and R. F. Schaefer
    IEEE International Symposium on Information Theory (ISIT ’21), Melbourne, Australia, July 2021.

  4. Detectability of Denial-of-Service Attacks on Arbitrarily Varying Classical-Quantum Channels
    H. Boche, M. Cai, H. V. Poor, and R. F. Schaefer
    IEEE International Symposium on Information Theory (ISIT ’21), Melbourne, Australia, July 2021.

  5. Computability Properties of the Broadcast Channel Capacity Region
    H. Boche, R. F. Schaefer, and H. V. Poor
    IEEE International Symposium on Information Theory (ISIT ’21), Melbourne, Australia, July 2021.

Published Papers

  1. Reinforce Security: A Model-free Approach Towards Secure Wiretap Coding
    R. Fritschek, R. F. Schaefer, and G. Wunder
    will appear at IEEE International Conference on Communications (ICC ’21), Montreal, Canada, June 2021.

  2. Turing Meets Shannon: Algorithmic Constructability of Capacity-Achieving Codes
    H. Boche, R. F. Schaefer, and H. V. Poor
    will appear at IEEE International Conference on Communications (ICC ’21), Montreal, Canada, June 2021.

  3. Algorithmic Detection of Adversarial Attacks on Message Transmission and ACK/NACK Feedback
    H. Boche, R. F. Schaefer, and H. V. Poor
    will appear at IEEE International Conference on Communications (ICC ’21), Montreal, Canada, June 2021.

  4. Federated Learning With Local Differential Privacy: Trade-Offs Between Privacy, Utility, and Communication
    M. Kim, O. Günlü, and R. F. Schaefer
    will appear at IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP ’21), Toronto, Canada, June 2021.

  5. Real Number Signal Processing Can Detect Denial-of-Service Attacks
    H. Boche, R. F. Schaefer, and H. V. Poor
    will appear at IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP ’21), Toronto, Canada, June 2021.

  6. Communication over Block Fading Channels – An Algorithmic Perspective on Optimal Transmission Schemes
    H. Boche, R. F. Schaefer, and H. V. Poor
    will appear at IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP ’21), Toronto, Canada, June 2021.

  7. Secure Transmission in IRS-Assisted MIMO Systems with Active Eavesdroppers
    A. Bereyhi, S. Assad, R. R. Müller, R. F. Schaefer, and H. V. Poor
    54th Annual Asilomar Conference on Signals, Systems, and Computers (ACSSC ’20), Pacific Grove, CA, USA, Nov. 2020, invited.

  8. Randomized Nested Polar Subcode Constructions for Privacy, Secrecy, and Storage
    O. Günlü, P. Trifonov, M. Kim, R. F. Schaefer, and V. Sidorenko
    Proc. IEEE International Symposium on Information Theory and its Applications (ISITA ’20), Kapolei, HI, USA, Oct. 2020, pp. 475-479.

  9. Deep Learning Based Wiretap Coding via Mutual Information Estimation
    R. Fritschek, R. F. Schaefer, and G. Wunder
    Proc. ACM Workshop on Wireless Security and Machine Learning (WiseML ’20), Linz, Austria, July 2020, pp. 74-79.

  10. Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication
    O. Günlü, R. F. Schaefer, and H. V. Poor
    Proc. IEEE International Symposium on Information Theory (ISIT ’20), Los Angeles, CA, USA, June 2020, pp. 874-878.

  11. On the Algorithmic Computability of Achievability and Converse: epsilon-Capacity of Compound Channels and Asymptotic Bounds of Error-Correcting Codes
    H. Boche, R. F. Schaefer, and H. V. Poor
    Proc. IEEE International Symposium on Information Theory (ISIT ’20), Los Angeles, CA, USA, June 2020, pp. 2008-2013.

  12. Neural Mutual Information Estimation for Channel Coding: State-of-the-Art Estimators, Analysis, and Performance Comparison
    R. Fritschek, R. F. Schaefer, and G. Wunder
    Proc. 21st IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC ’20), Atlanta, GA, USA, May 2020, pp. 1-5, invited.

  13. Linear Precoder Design for Physical Layer Security via Reconfigurable Intelligent Surfaces
    G. Amarasuriya, R. F. Schaefer, and H. V. Poor
    Proc 21st IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC ’20)/, Atlanta, GA, USA, May 2020, pp. 1-5, invited.

  14. Low-Complexity and Reliable Transforms for Physical Unclonable Functions
    O. Günlü and R. F. Schaefer
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP ’20), Barcelona, Spain, May 2020, pp. 2807-2811.

  15. Robust Transmission over Channels with Channel Uncertainty: An Algorithmic Perspective
    H. Boche, R. F. Schaefer, and H. V. Poor
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP ’20), Barcelona, Spain, May 2020, pp. 5230-5234.

  16. Hybrid Precoding for Secure Transmission in Reflect-Array-Assisted Massive MIMO Systems
    S. Asaad, R. F. Schaefer, and H. V. Poor
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP ’20), Barcelona, Spain, May 2020, pp. 8693-8697.

  17. On the epsilon-Capacity of Finite Compound Channels with Applications to the Strong Converse and Second Order Coding Rate
    H. Boche, R. F. Schaefer, and H. V. Poor
    Proc. 54th Annual Conference on Information Sciences and Systems (CISS ’20), Princeton, NJ, USA, Mar. 2020, pp. 1-6.

  18. Resource Allocation for Secure Communication Systems: Algorithmic Solvability
    H. Boche, R. F. Schaefer, and H. V. Poor
    Proc. IEEE International Workshop on Information Forensics and Security (WIFS ’19), Delft, The Netherlands, Dec. 2019, pp. 1-6.

  19. Secure Regularized Zero Forcing for Multiuser MIMOME Channels
    S. Asaad, A. Bereyhi, R. R. Müller, and R. F. Schaefer
    Proc. 53th Annual Asilomar Conference on Signals, Systems, and Computers (ACSSC ’19), Pacific Grove, CA, USA, Nov. 2019, pp. 1108-1113.

  20. Joint User Selection and Precoding in Multiuser MIMO Systems via Group LASSO
    S. Asaad, A. Bereyhi, R. R. Müller, and R. F. Schaefer
    Proc. IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC ’19), Istanbul, Turkey, Sep. 2019, pp. 1-6, invited.

  21. Private Authentication with Physical Identifiers Through Broadcast Channel Measurements
    O. Günlü, R. F. Schaefer, and G. Kramer
    Proc. IEEE Information Theory Workshop (ITW ’19), Visby, Sweden, Aug. 2019, pp. 1-5.

  22. Coding for Non-IID Sources and Channels: Entropic Approximations and a Question of Ahlswede
    H. Boche, R. F. Schaefer, and H. V. Poor
    Proc. IEEE Information Theory Workshop (ITW ’19), Visby, Sweden, Aug. 2019, pp. 1-5.

  23. On the Structure of the Capacity Formula for General Finite State Channels with Applications
    H. Boche, R. F. Schaefer, and H. V. Poor
    Proc. IEEE Information Theory Workshop (ITW ’19), Visby, Sweden, Aug. 2019, pp. 1-5.

  24. On D2D Caching with Uncoded Cache Placement
    C. Yapar, K. Wan, R. F. Schaefer, and G. Caire
    Proc. IEEE International Symposium on Information Theory (ISIT ’19), Paris, France, July 2019, pp. 2992-2996.

  25. On Stochastic Orders and Fading Gaussian Multi-User Channels with Statistical CSIT
    P.-H. Lin, E. A. Jorswieck, R. F. Schaefer, C. R. Janda, and M. Mittelbach
    Proc. IEEE International Symposium on Information Theory (ISIT ’19), Paris, France, July 2019, pp. 1497-1501.

  26. Identification Capacity of Correlation-Assisted Discrete Memoryless Channels: Analytical Properties and Representations
    H. Boche, R. F. Schaefer, and H. V. Poor
    Proc. IEEE International Symposium on Information Theory (ISIT ’19), Paris, France, July 2019, pp. 470-474.

  27. Deep Learning for Channel Coding via Neural Mutual Information Estimation
    R. Fritschek, R. F. Schaefer, and G. Wunder
    Proc. 20th IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC ’19), Cannes, France, July 2019, pp. 1-5.

  28. Turing Meets Shannon: On the Algorithmic Computability of the Capacities of Secure Communication Systems
    R. F. Schaefer, H. Boche, and H. V. Poor
    Proc. 20th IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC ’19), Cannes, France, July 2019, pp. 1-5, invited.

  29. Deep Learning for the Gaussian Wiretap Channel
    R. Fritschek, R. F. Schaefer, and G. Wunder
    Proc. IEEE International Conference on Communications (ICC ’19), Shanghai, China, May 2019, pp. 1-6.

  30. Copulas and Multi-user Channel Orders
    P.-H. Lin, E. A. Jorswieck, R. F. Schaefer, C. R. Janda, and M. Mittelbach
    Proc. IEEE International Conference on Communications (ICC ’19), Shanghai, China, May 2019, pp. 1-6.

  31. Detectability of Denial-of-Service Attacks on Communication Systems
    H. Boche, R. F. Schaefer, and H. V. Poor
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP ’19), Brighton, UK, May 2019, pp. 2532-2536.

  32. On the Computability of the Secret Key Capacity under Rate Constraints
    H. Boche, R. F. Schaefer, and H. V. Poor
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP ’19), Brighton, UK, May 2019, pp. 2427-2431.

  33. Performance Evaluation of Secure Communication Systems on Turing Machines
    H. Boche, R. F. Schaefer, and H. V. Poor
    Proc. IEEE International Workshop on Information Forensics and Security (WIFS ’18), Hong Kong, Dec. 2018, pp. 1-7.

  34. The Deterministic and Correlated Random Public-Confidential Capacity Regions of the Arbitrarily Varying Wiretap Channel
    A. S. Mansour, R. F. Schaefer, and H. Boche
    Proc. IEEE International Workshop on Information Forensics and Security (WIFS ’18), Hong Kong, Dec. 2018, pp. 1-7.

  35. On Robustness of Massive MIMO Systems Against Passive Eavesdropping under Antenna Selection
    A. Bereyhi, S. Asaad, R. R. Müller, R. F. Schaefer, and A. M. Rabiei
    Proc. IEEE Global Communications Conference (GLOBECOM ’18), Abu Dhabi, United Arab Emirates, Dec. 2018, pp. 1-7.

  36. Privacy Amplification: Recent Developments and Applications
    W. Yang, R. F. Schaefer, and H. V. Poor
    Proc. IEEE International Symposium on Information Theory and its Applications (ISITA ’18), Singapore, Oct. 2018, pp. 120-124, invited.

  37. Iterative Antenna Selection for Secrecy Enhancement in Massive MIMO Wiretap Channels
    A. Bereyhi, S. Asaad, R. F. Schaefer, and R. R. Müller
    Proc. 19th IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC ’18), Kalamata, Greece, June 2018, pp. 1-5, invited.

  38. Identification over Channels with Feedback: Discontinuity Behavior and Super-Activation
    H. Boche, R. F. Schaefer, and H. V. Poor
    Proc. IEEE International Symposium on Information Theory (ISIT ’18), Vail, CO, USA, June 2018, pp. 256-260.

  39. Secrecy Capacity Under List Decoding for a Channel With a Passive Eavesdropper and an Active Jammer
    A. S. Mansour, R. F. Schaefer, and H. Boche
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP ’18), Calgary, Canada, Apr. 2108, pp. 1972-1976.

  40. Optimal Number of Transmit Antennas for Secrecy Enhancement in Massive MIMOME Channels
    S. Asaad, A. Bereyhi, R. R. Müller, R. F. Schaefer, and A. M. Rabiei
    Proc. IEEE Global Communications Conference (GLOBECOM ’17), Singapore, Dec. 2017, pp. 1-6.

  41. Secure Communication in Underlay Cognitive Massive MIMO Systems with Pilot Contamination
    H. Al-Hraishawi, G. Amarasuriya, and R. F. Schaefer
    Proc. IEEE Global Communications Conference (GLOBECOM ’17), Singapore, Dec. 2017, pp. 1-7.

  42. Physical Layer Security in Massive MIMO Systems
    R. F. Schaefer, G. Amarasuriya, and H. V. Poor
    Proc. 51th Annual Asilomar Conference on Signals, Systems, and Computers (ACSSC ’17), Pacific Grove, CA, USA, Nov. 2017, pp. 3-8, invited.

  43. Stealthy Keyless Secret Key Generation from Degraded Sources
    P.-H. Lin, C. Janda, E. A. Jorswieck, and R. F. Schaefer
    Proc. 51th Annual Asilomar Conference on Signals, Systems, and Computers (ACSSC ’17), Pacific Grove, CA, USA, Nov. 2017, pp. 14-18, invited.

  44. Stabilizing the Secrecy Capacity of the Arbitrarily Varying Wiretap Channel and Transceiver Synchronization Using List Decoding
    A. S. Mansour, H. Boche, and R. F. Schaefer
    will appear at 18th IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC ’17), Sapporo, Japan, July 2017, pp. 1-5.

  45. Secrecy-Reliability Tradeoff for Semi-Deterministic Wiretap Channels at Finite Blocklength
    W. Yang, R. F. Schaefer, and H. V. Poor
    Proc. IEEE International Symposium on Information Theory (ISIT ’17), Aachen, Germany, June 2017, pp. 2133-2137.

  46. Characterization of Super-Additivity and Discontinuity Behavior of the Capacity of Arbitrarily Varying Channels under List Decoding [slides]
    H. Boche, R. F. Schaefer, and H. V. Poor
    Proc. IEEE International Symposium on Information Theory (ISIT ’17), Aachen, Germany, June 2017, pp. 2820-2824.

  47. Improper Signaling in Two-Path Relay Channels
    M. Gaafar, O. Amin, R. F. Schaefer, and M.-S. Alouini
    Proc. IEEE International Conference on Communications: Workshop on Full-Duplex Communications for Future Wireless Networks (ICC - FDC ’17), Paris, France, May 2017, pp. 930-935.

  48. Secret-Key Capacity of Infinite Compound Sources with Communication Rate Constraint
    N. Tavangaran, H. Boche, and R. F. Schaefer
    Proc. IEEE International Conference on Communications (ICC ’17), Paris, France, May 2017, pp. 1-6.

  49. Improper Signaling for Virtual Full-Duplex Relay Systems
    M. Gaafar, O. Amin, R. F. Schaefer, and M.-S. Alouini
    Proc. 21st International ITG Workshop on Smart Antennas (WSA ’17), Berlin, Germany, Mar. 2017, pp. 365-370.

  50. On the Capacity of Fading Broadcast Channels with Statistical CSIT and Memory
    P.-H. Lin, E. A. Jorswieck, R. F. Schaefer, and M. Mittelbach
    Proc. 11th International ITG Conference on Systems, Communications and Coding (SCC ’17), Hamburg, Germany, Feb. 2017, pp. 1-5.

  51. Private Authentication with Controllable Measurement
    K. Kittichokechai, R. F. Schaefer, O. Günlü, and G. Caire
    Proc. 50th Annual Asilomar Conference on Signals, Systems, and Computers (ACSSC ’16), Pacific Grove, CA, USA, Nov. 2016, pp. 1680-1684, invited.

  52. List Decoding for Arbitrarily Varying Wiretap Channels
    A. S. Mansour, H. Boche, and R. F. Schaefer
    Proc. IEEE Conference on Communications and Network Security: Workshop on Physical-layer Methods for Wireless Security (CNS - PhySec ’16), Philadelphia, PA, USA, Oct. 2016, pp. 611-615.

  53. The Ergodic Secrecy Sum Rate for Multiuser MIMO Downlink Systems Using Block Diagonalization
    X. Wang, R. F. Schaefer, L. Thiele, T. Haustein, and Y. Wang
    Proc. IEEE Conference on Communications and Network Security: Workshop on Physical-layer Methods for Wireless Security (CNS - PhySec ’16), Philadelphia, PA, USA, Oct. 2016, pp. 636-640.

  54. Secret Key Generation Through a Relay
    K. Kittichokechai, R. F. Schaefer, and G. Caire
    Proc. IEEE Information Theory Workshop (ITW ’16), Cambridge, UK, Sep. 2016, pp. 196-200.

  55. On Ergodic Fading Gaussian Interference Channels with Statistical CSIT
    P.-H. Lin, E. A. Jorswieck, and R. F. Schaefer
    Proc. IEEE Information Theory Workshop (ITW ’16), Cambridge, UK, Sep. 2016, pp. 454-458.

  56. Secure Transmission in Cognitive Massive MIMO Systems with Underlay Spectrum Sharing
    G. Amarasuriya and R. F. Schaefer
    Proc. 9th International Symposium on Turbo Codes & Iterative Information Processing (ISTC ’16), Brest, Fance, Sep. 2016, pp. 380-384, invited.

  57. Finite-Blocklength Bounds for Wiretap Channels
    W. Yang, R. F. Schaefer, and H. V. Poor
    Proc. IEEE International Symposium on Information Theory (ISIT ’16), Barcelona, Spain, July 2016, pp. 3087-3091. (Extended version available on http://arxiv.org/abs/1601.06055)

  58. Super-Activation as a Unique Feature of Arbitrarily Varying Wiretap Channels
    R. F. Schaefer, H. Boche, and H. V. Poor
    Proc. IEEE International Symposium on Information Theory (ISIT ’16), Barcelona, Spain, July 2016, pp. 3077-3081.

  59. Secure Communication in Massive MIMO Relay Networks
    G. Amarasuriya, R. F. Schaefer, and H. V. Poor
    Proc. 17th IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC ’16), Edinburgh, UK, July 2016, pp. 1-5, invited.

  60. Degradedness and Stochastic Orders of Fast Fading Gaussian Broadcast Channels with Statistical Channel State Information at the Transmitter
    P.-H. Lin, E. A. Jorswieck, R. F. Schaefer, C. Janda, and M. Mittelbach
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP ’16), Shanghai, China, Mar. 2016, pp. 3846-3850.

  61. Secure Broadcasting Over Parallel Channels with Independent Secret Keys
    R. F. Schaefer, A. Khisti, and H. V. Poor
    Proc. International Zurich Seminar on Communications (IZS ’16), Zurich, Switzerland, Mar. 2016, pp. 116-120, invited.

  62. On the Secrecy Capacity of the Z-Interference Channel
    R. Bustin, M. Vaezi, R. F. Schaefer, and H. V. Poor
    Proc. International Zurich Seminar on Communications (IZS ’16), Zurich, Switzerland, Mar. 2016, pp. 190-194, invited.

  63. On the Secrecy Capacity of Rank-Deficient Compound Wiretap Channels
    R. F. Schaefer and S. Loyka
    Proc. IEEE Global Communications Conference: Workshop on Trusted Communications with Physical Layer Security (GLOBECOM - TCPLS ’15), San Diego, CA, USA, Dec. 2015, pp. 1-6.

  64. On the Degradedness of Fast Fading Gaussian Multiple-Antenna Wiretap Channels with Statistical Channel State Information at the Transmitter
    P.-H. Lin, E. A. Jorswieck, R. F. Schaefer, and M. Mittelbach
    Proc. IEEE Global Communications Conference: Workshop on Trusted Communications with Physical Layer Security (GLOBECOM - TCPLS ’15), San Diego, CA, USA, Dec. 2015, pp. 1-5.

  65. Robust PUF based Authentication
    A. Grigorescu, H. Boche, and R. F. Schaefer
    Proc. IEEE International Workshop on Information Forensics and Security (WIFS ’15), Rome, Italy, Nov. 2015, pp. 1-6.

  66. The Multiple-Access Channel with an External Eavesdropper: Trusted vs. Untrusted Users
    M. Goldenbaum, R. F. Schaefer, and H. V. Poor
    Proc. 49th Annual Asilomar Conference on Signals, Systems, and Computers (ACSSC ’15), Pacific Grove, CA, USA, Nov. 2015, pp. 564-568, invited.

  67. Strong Secrecy for Interference Channels from Channel Resolvability
    Z. Wang, R. F. Schaefer, M. Skoglund, M. Xiao, and H. V. Poor
    Proc. 49th Annual Asilomar Conference on Signals, Systems, and Computers (ACSSC ’15), Pacific Grove, CA, USA, Nov. 2015, pp. 559-563, invited.

  68. Secret-Key Capacity of Compound Source Models with One-Way Public Communication
    N. Tavangaran, H. Boche, and R. F. Schaefer
    Proc. IEEE Information Theory Workshop (ITW ’15), Jeju, Korea, Oct. 2015, pp 252-256.

  69. An I-MMSE Based Graphical Representation of Rate and Equivocation for the Gaussian Broadcast Channel
    R. Bustin, R. F. Schaefer, H. V. Poor, and S. Shamai (Shitz)
    Proc. IEEE Conference on Communications and Network Security: Workshop on Physical-layer Methods for Wireless Security (CNS - PhySec ’15), Florence, Italy, Sep. 2015, pp. 53-58.

  70. The Individual Secrecy Capacity of the Gaussian SISO and Degraded Gaussian MIMO Multi-Receiver Wiretap Channel
    A. S. Mansour, R. F. Schaefer, and H. Boche
    Proc. 16th IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC ’15), Stockholm, Sweden, June 2015, pp. 365-369, invited.

  71. How to Use Independent Secret Keys for Secure Broadcasting of Common Messages
    R. F. Schaefer, A. Khisti, and H. V. Poor
    Proc. IEEE International Symposium on Information Theory (ISIT ’15), Hong Kong, Hong Kong, June 2015, pp. 1971-1975.

  72. On MMSE Properties of ‘‘Good’’ and ‘‘Bad’’ Codes for the Gaussian Broadcast Channel
    R. Bustin, R. F. Schaefer, H. V. Poor, and S. Shamai (Shitz)
    Proc. IEEE International Symposium on Information Theory (ISIT ’15), Hong Kong, Hong Kong, June 2015, pp. 391-395.

  73. On MMSE Properties of Codes for the Gaussian Broadcast Channel with Confidential Messages
    R. Bustin, R. F. Schaefer, H. V. Poor, and S. Shamai (Shitz)
    Proc. IEEE International Conference on Communications: Workshop on Wireless Physical Layer Security (ICC - WPLS ’15), London, UK, June 2015, pp. 441-446.

  74. On the Continuity of the Secrecy Capacity of Wiretap Channels Under Channel Uncertainty
    H. Boche, R. F. Schaefer, and H. V. Poor
    Proc. IEEE International Conference on Communications (ICC ’15), London, UK, June 2015, pp. 4163-4168.

  75. The Individual Secrecy Capacity of Degraded Multi-Receiver Wiretap Broadcast Channels
    A. S. Mansour, R. F. Schaefer, and H. Boche
    Proc. IEEE International Conference on Communications (ICC ’15), London, UK, June 2015, pp. 4181-4186.

  76. Optimal Transmission Rate for MISO Channels with Joint Sum and Per-Antenna Power Constraints
    P. L. Cao, T. J. Oechtering, R. F. Schaefer, and M. Skoglund
    Proc. IEEE International Conference on Communications (ICC ’15), London, UK, June 2015, pp. 4727-4732.

  77. On MMSE Properties of Optimal Codes for the Gaussian Wiretap Channel
    R. Bustin, R. F. Schaefer, H. V. Poor, and S. Shamai (Shitz)
    Proc. IEEE Information Theory Workshop (ITW ’15), Jerusalem, Israel, Apr. 2015, pp. 1-5.

  78. Capacity Region Continuity of the Compound Broadcast Channel with Confidential Messages
    A. Grigorescu, H. Boche, R. F. Schaefer, and H. V. Poor
    Proc. IEEE Information Theory Workshop (ITW ’15), Jerusalem, Israel, Apr. 2015, pp. 1-5.

  79. Robust Transmission over Wiretap Channels with Secret Keys
    R. F. Schaefer and H. V. Poor
    Proc. 48th Annual Asilomar Conference on Signals, Systems, and Computers (ACSSC ’14), Pacific Grove, CA, USA, Nov. 2014, pp. 60-64, invited.

  80. Secrecy Measures for Broadcast Channels With Receiver Side Information: Joint vs Individual
    A. S. Mansour, R. F. Schaefer, and H. Boche
    Proc. IEEE Information Theory Workshop (ITW ’14), Hobart, Australia, Nov. 2014, pp. 426-430.

  81. On Secure Communication over Multiple Access Wiretap Channels under Channel Uncertainty
    R. F. Schaefer and H. V. Poor
    Proc. IEEE Conference on Communications and Network Security: Workshop on Physical-layer Methods for Wireless Security (CNS - PhySec ’14), San Francisco, CA, USA, Oct. 2014, pp. 109-114, invited.

  82. The Compound Secrecy Capacity of a Class of Non-Degraded MIMO Gaussian Channels
    R. F. Schaefer and S. Loyka
    Proc. 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton ’14), Monticello, IL, USA, Oct. 2014, pp. 1004-1010.

  83. On Arbitrarily Varying Wiretap Channels for Different Classes of Secrecy Measures
    H. Boche, R. F. Schaefer, and H. V. Poor
    Proc. IEEE International Symposium on Information Theory (ISIT ’14), Honolulu, HI, USA, June 2014, pp. 2376-2380.

  84. Joint and Individual Secrecy in Broadcast Channels with Receiver Side Information
    A. S. Mansour, R. F. Schaefer, and H. Boche
    Proc. 15th IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC ’14), Toronto, Canada, June 2014, pp. 369-373.

  85. Arbitrarily Varying Wiretap Channels with Finite Coordination Resources
    H. Boche and R. F. Schaefer
    Proc. IEEE International Conference on Communications: Workshop on Wireless Physical Layer Security (ICC - WPLS ’14), Sydney, Australia, June 2014, pp. 746-751.

  86. List Decoding for Arbitrarily Varying Multiple Access Channels with Conferencing Encoders
    H. Boche and R. F. Schaefer
    Proc. IEEE International Conference on Communications (ICC ’14), Sydney, Australia, June 2014, pp. 1934-1940.

  87. How Much Coordination is Needed for Robust Broadcasting over Arbitrarily Varying Bidirectional Broadcast Channels
    R. F. Schaefer and H. Boche
    Proc. IEEE International Conference on Communications (ICC ’14), Sydney, Australia, June 2014, pp. 1872-1877.

  88. On the Use of Secret Keys in Broadcast Channels with Receiver Side Information
    R. F. Schaefer, A. Khisti, and H. Boche
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP ’14), Florence, Italy, May 2014, pp. 1582-1586.

  89. Strong Secrecy and Decoding Performance Analysis for Robust Broadcasting Under Channel Uncertainty
    R. F. Schaefer and H. Boche
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP ’14), Florence, Italy, May 2014, pp. 3973-3977.

  90. Secure Broadcasting of a Common Message using Independent Secret Keys
    R. F. Schaefer and A. Khisti
    Proc. 48th Annual Conference on Information Sciences and Systems (CISS ’14), Princeton, USA, Mar. 2014, pp. 1-6, invited.

  91. The Secrecy Capacity of a Compound MIMO Gaussian Channel
    R. F. Schaefer and S. Loyka
    Proc. IEEE Information Theory Workshop (ITW ’13), Seville, Spain, Sep. 2013, pp. 104-108.

  92. Capacity Results, Coordination Resources, and Super-Activation in Wiretap Channels
    H. Boche and R. F. Schaefer
    Proc. IEEE International Symposium on Information Theory (ISIT ’13), Istanbul, Turkey, July 2013, pp. 1342-1346.

  93. MIMO Gaussian Broadcast Channels with Private and Confidential Messages and with Receiver Side Information
    R. F. Schaefer, H. V. Poor, and H. Boche
    Proc. 14th IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC ’13), Darmstadt, Germany, June 2013, pp. 659-663, invited.

  94. Bidirectional Relay Communication with Additional Private Message
    K. Benidis, R. F. Schaefer, and H. Boche
    Proc. 14th IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC ’13), Darmstadt, Germany, June 2013, pp. 41-45, invited.

  95. On the Strong Secrecy Capacity of Wiretap Channels with Side Information
    H. Boche and R. F. Schaefer
    Proc. IEEE International Conference on Communications (ICC ’13), Budapest, Hungary, June 2013, pp. 3408-3412.

  96. Optimal Transceiver Design for Wiretap Channels with Side Information
    H. Boche and R. F. Schaefer
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP ’13), Vancouver, Canada, May 2013, pp. 2891-2895.

  97. Secret Key Generation Using Compound Sources - Optimal Key-Rates and Communication Costs
    H. Boche and R. F. Wyrembelski
    Proc. 9th International ITG Conference on Systems, Communications and Coding (SCC ’13), Munich, Germany, Jan. 2013, pp. 1-6.

  98. Robust Physical Layer Service Integration in Bidirectional Relay Networks: Common Messages
    R. F. Wyrembelski, H. Boche, and T. J. Oechtering
    Proc. 9th International ITG Conference on Systems, Communications and Coding (SCC ’13), Munich, Germany, Jan. 2013, pp. 1-6.

  99. Comparison of Different Attack Classes in Arbitrarily Varying Wiretap Channels
    H. Boche and R. F. Wyrembelski
    Proc. IEEE International Workshop on Information Forensics and Security (WIFS ’12), Tenerife, Spain, Dec. 2012, pp. 270-275.

  100. Polar Codes for Bidirectional Broadcast Channels with Common and Confidential Messages
    M. Andersson, R. F. Wyrembelski, T. J. Oechtering, and M. Skoglund
    Proc. 9th International Symposium on Wireless Communication Systems (ISWCS ’12), Paris, France, Aug. 2012, pp. 1014-1018, invited.

  101. Strong Secrecy in Compound Broadcast Channels with Confidential Messages
    R. F. Wyrembelski and H. Boche
    Proc. IEEE International Symposium on Information Theory (ISIT ’12), Cambridge, MA, USA, July 2012, pp. 76-80.

  102. Robust Transmit Strategies for Multiantenna Bidirectional Broadcast Channels
    R. F. Wyrembelski, T. J. Oechtering, H. Boche, and M. Skoglund
    Proc. 16th International ITG Workshop on Smart Antennas (WSA ’12), Dresden, Germany, Mar. 2012, pp. 46-53.

  103. Service Integration in Multiantenna Bidirectional Relay Networks: Public and Confidential Messages
    R. F. Wyrembelski and H. Boche
    Proc. IEEE Global Communications Conference: Physical-Layer Security Workshop (GLOBECOM - PLS ’11), Houston, TX, USA, Dec. 2011, pp. 884-888.

  104. Strong Secrecy in Bidirectional Relay Network
    R. F. Wyrembelski, M. Wiese, and H. Boche
    Proc. 45th Annual Asilomar Conference on Signals, Systems, and Computers (ACSSC ’11), Pacific Grove, CA, USA, Nov. 2011, pp. 217-221, invited.

  105. Secrecy in Broadcast Channels with Receiver Side Information
    R. F. Wyrembelski, Aydin Sezgin, and H. Boche
    Proc. 45th Annual Asilomar Conference on Signals, Systems, and Computers (ACSSC ’11), Pacific Grove, CA, USA, Nov. 2011, pp. 290-294.

  106. Bidirectional Broadcast Channels with Common and Confidential Messages
    R. F. Wyrembelski and H. Boche
    Proc. IEEE Information Theory Workshop (ITW ’11), Paraty, Brazil, Oct. 2011, pp. 713-717.

  107. How to Achieve Privacy in Bidirectional Relay Networks
    R. F. Wyrembelski and H. Boche
    Proc. IEEE International Symposium on Information Theory (ISIT ’11), Saint Petersburg, Russia, July 2011, pp. 1891-1895.

  108. Secrecy in MIMO Gaussian Bidirectional Broadcast Channels
    R. F. Wyrembelski and H. Boche
    Proc. 12th IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC ’11), San Francisco, CA, USA, June 2011, pp. 361-365.

  109. MIMO Bidirectional Broadcast Channels with Common Message
    R. F. Wyrembelski, T. J. Oechtering, and H. Boche
    Proc. IEEE Global Communications Conference (GLOBECOM ’10), Miami, FL, USA, Dec. 2010, pp. 1-5.

  110. On Arbitrarily Varying Bidirectional Broadcast Channels with Constraints on Input and States
    R. F. Wyrembelski, I. Bjelakovic, and H. Boche
    Proc. IEEE International Symposium on Information Theory and its Applications (ISITA ’10), Taichung, Taiwan, Oct. 2010, pp. 410-415.

  111. Degrees of Coordination in Cognitive Networks
    H. Boche and R. F. Wyrembelski
    Proc. 5th International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM ’10), Cannes, France, June 2010, pp. 1-5, invited.

  112. List Decoding for Bidirectional Broadcast Channels with Unknown Varying Channels
    R. F. Wyrembelski, I. Bjelakovic, and H. Boche
    Proc. IEEE International Conference on Communications (ICC ’10), Cape Town, South Africa, May 2010, pp. 1-6.

  113. Bidirectional Relaying in Wireless Networks - Impact of Degree of Coordination
    R. F. Wyrembelski, I. Bjelakovic, and H. Boche
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP ’10), Dallas, TX, USA, Mar. 2010, pp. 3234-3237.

  114. On the Capacity of Bidirectional Relaying with Unknown Varying Channels
    R. F. Wyrembelski, I. Bjelakovic, and H. Boche
    Proc. 3rd International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP ’09), Aruba, Dutch Antilles, Dec. 2009, pp. 269-272.

  115. Coding Strategies for Bidirectional Relaying for Arbitrarily Varying Channels
    R. F. Wyrembelski, I. Bjelakovic, and H. Boche
    Proc. IEEE Global Communications Conference (GLOBECOM ’09), Honolulu, HI, USA, Dec. 2009, pp. 1-6.

  116. On the Capacity of Bidirectional Broadcast Channels under Channel Uncertainty
    R. F. Wyrembelski, I. Bjelakovic, T. J. Oechtering, and H. Boche
    Proc. IEEE International Conference on Communications (ICC ’09), Dresden, Germany, June 2009, pp. 1-5.

  117. On the Optimal Transmission for the MIMO Bidirectional Broadcast Channel
    T. J. Oechtering, R. F. Wyrembelski, and H. Boche
    Proc. IEEE International Conference on Communications (ICC ’09), Dresden, Germany, June 2009, pp. 1-5.

  118. Optimal Time-Division of Two-Phase Decode-and-Forward Bidirectional Relaying
    T. J. Oechtering, R. F. Wyrembelski, and H. Boche
    Proc. IEEE International Symposium on Information Theory and its Applications (ISITA ’08), Auckland, New Zealand, Dec. 2008, pp. 829-834.

  119. Decode-and-Forward Strategies for Bidirectional Relaying
    R. F. Wyrembelski, T. J. Oechtering, and H. Boche
    Proc. 19th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC ’08), Cannes, France, Sep. 2008, pp. 1-6, invited.

  120. Optimal Transmit Strategy for the 2×1 MISO Bidirectional Broadcast Channel
    T. J. Oechtering, R. F. Wyrembelski, and H. Boche
    Proc. 9th IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC ’08), Recife, Brazil, July 2008, pp. 316-320.

  121. Capacity of Gaussian MIMO Bidirectional Broadcast Channels
    R. F. Wyrembelski, T. J. Oechtering, I. Bjelakovic, C. Schnurr, and H. Boche
    Proc. IEEE International Symposium on Information Theory (ISIT ’08), Toronto, Canada, July 2008, pp. 584-588.

  122. The Asymptotic Performance of Three-Hop Relay Communication using Amplify-and-Forward
    R. F. Wyrembelski, T. J. Oechtering, and H. Boche
    Proc. 7th International ITG Conference on Source and Channel Coding (SCC ’08), Ulm, Germany, Jan. 2008, pp. 1-6.