Journal Articles

Under Submission

  1. Algorithmic Detectability of Denial-of-Service Attacks on Classical-Quantum Channels
    H. Boche, M. Cai, H. V. Poor, and R. F. Schaefer
    submitted to Journal of Mathematical Physics, Mar. 2021.

  2. Privacy, Secrecy, and Storage with Nested Randomized Polar Subcode Constructions
    O. Günlü, P. Trifonov, M. Kim, R. F. Schaefer, and V. Sidorenko
    submitted to IEEE Transactions on Communications, Mar. 2021.

  3. Differential Privacy for Eye Tracking with Temporal Correlations
    O. Günlü, E. Bozkir, W. Fuhl, R. F. Schaefer, and E. Kasneci
    submitted to PLOS ONE Journal, Feb. 2021.

  4. Deep Learning for Channel Coding: Using Mutual Information Estimation to Decouple End-to-End Learning
    R. Fritschek, R. F. Schaefer, and G. Wunder
    submitted to IEEE Journal on Selected Areas in Communications - Series on Machine Learning in Communications and Networks, Dec. 2020.

  5. Turing Meets Shannon: On the Algorithmic Construction of Channel-Aware Codes
    H. Boche, R. F. Schaefer, and H. V. Poor
    submitted to IEEE Transactions on Communications, Nov. 2020.

Published Articles

  1. Securing Massive MIMO Systems: Secrecy for Free with Low-Complexity Architectures
    A. Bereyhi, S. Asaad, R. R. Müller, R. F. Schaefer, G. Fischer, and H. V. Poor
    will appear in IEEE Transactions on Wireless Communications, early access.

  2. On the Algorithmic Solvability of Channel Dependent Classification Problems in Communication Systems
    H. Boche, R. F. Schaefer, and H. V. Poor
    will appear in IEEE/ACM Transactions on Networking, early access.

  3. An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications
    M. Bloch, O. Günlü, A. Yener, F. Oggier, H. V. Poor, L. Sankar, and R. F. Schaefer
    IEEE Journal on Selected Areas in Information Theory, vol. 2, no. 1, pp. 5-22, Mar. 2021.

  4. Controllable Key Agreement with Correlated Noise
    O. Günlü and R. F. Schaefer
    IEEE Journal on Selected Areas in Information Theory, vol. 2, no. 1, pp. 82-94, Mar. 2021.

  5. An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions
    O. Günlü and R. F. Schaefer
    Entropy, vol. 23, no. 1, pp. 16, 2021.

  6. Shannon Meets Turing: Non-Computability and Non-Approximability of the Finite State Channel Capacity
    H. Boche, R. F. Schaefer, and H. V. Poor
    Communications in Information and Systems, vol. 20, no. 2, pp. 81-116, 2020, invited in honor of Prof. Thomas Kailath on the occasion of his 85th birthday.

  7. New Capacity Results for Fading Gaussian Multiuser Channels with Statistical CSIT
    P.-H. Lin, E. A. Jorswieck, R. F. Schaefer, M. Mittelbach, and C. R. Janda
    IEEE Transactions on Communications, vol. 68, no. 11, pp. 6761-6774, Nov. 2020.

  8. Communication under Channel Uncertainty: An Algorithmic Perspective and Effective Construction
    H. Boche, R. F. Schaefer, and H. V. Poor
    IEEE Transactions on Signal Processing, vol. 68, pp. 6224-6239, 2020.

  9. Identification Capacity of Channels with Feedback: Discontinuity Behavior, Super-Activation, and Turing Computability
    H. Boche, R. F. Schaefer, and H. V. Poor
    IEEE Transactions on Information Theory, vol. 66, no. 10, pp. 6184-6199, Oct. 2020.

  10. Denial-of-Service Attacks on Communication Systems: Detectability and Jammer Knowledge
    H. Boche, R. F. Schaefer, and H. V. Poor
    IEEE Transactions on Signal Processing, vol. 68, pp. 3754-3768, 2020.

  11. Stealthy Secret Key Generation
    P.-H. Lin, C. R. Janda, E. A. Jorswieck, and R. F. Schaefer
    Entropy - Special Issue ‘‘Wireless Networks: Information Theoretic Perspectives’’, vol. 22, no. 6, pp. 679, June 2020.

  12. Secure Communication and Identification Systems – Effective Performance Evaluation on Turing Machines
    H. Boche, R. F. Schaefer, and H. V. Poor
    IEEE Transactions on Information Forensics and Security, vol. 15, pp. 1013-1025, 2020.

  13. Secure Storage Capacity under Rate Constraints – Continuity and Super Activation
    S. Baur, H. Boche, R. F. Schaefer, and H. V. Poor
    IEEE Transactions on Information Forensics and Security, vol. 15, pp. 959-970, 2020.

  14. On the Optimality of D2D Coded Caching with Uncoded Cache Placement and One-shot Delivery
    C. Yapar, K. Wan, R. F. Schaefer, and G. Caire
    IEEE Transactions on Communications, vol. 67, no. 12, pp. 8179-8192, Dec. 2019.

  15. On the Algorithmic Computability of the Secret Key and Authentication Capacity under Channel, Storage, and Privacy Leakage Constraints
    H. Boche, R. F. Schaefer, S. Baur, and H. V. Poor
    IEEE Transactions on Signal Processing, vol. 67, no. 17, pp. 4636-4648, Sep. 2019.

  16. Wiretap Channels: Nonasymptotic Fundamental Limits
    W. Yang, R. F. Schaefer, and H. V. Poor
    IEEE Transactions on Information Theory, vol. 65, no. 7, pp. 4069-4093, July 2019. (Preprint available on http://arxiv.org/abs/1706.03866)

  17. The Secrecy Capacity of the Arbitrarily Varying Wiretap Channel under List Decoding
    A. S. Mansour, H. Boche, and R. F. Schaefer
    Advances in Mathematics of Communications, vol. 13, no. 1, pp. 11-39, Feb. 2019.

  18. Secret-Key Generation and Convexity of the Rate Region Using Infinite Compound Sources
    N. Tavangaran, R. F. Schaefer, H. V. Poor, and H. Boche
    IEEE Transactions on Information Forensics and Security, vol. 13, no. 8, pp. 2075-2086, Aug. 2018.

  19. Controllable Identifier Measurements for Private Authentication with Secret Keys
    O. Günlü, K. Kittichokechai, R. F. Schaefer, and G. Caire
    IEEE Transactions on Information Forensics and Security, vol. 13, no. 8, pp. 1945-1959, Aug. 2018. (Preprint available on http://arxiv.org/abs/1804.01430)

  20. Analytical Properties of Shannon's Capacity of Arbitrarily Varying Channels under List Decoding: Super-Additivity and Discontinuity Behavior
    H. Boche, R. F. Schaefer, and H. V. Poor
    Problems of Information Transmission, vol. 54, no. 3, pp. 199-228, July 2018.

  21. Strong Secrecy for Interference Channels Based on Channel Resolvability
    Z. Wang, R. F. Schaefer, M. Skoglund, M. Xiao, H. V. Poor
    IEEE Transactions on Information Theory, vol. 64, no. 7, pp. 5110-5130, July 2018.

  22. Secure Communication in Spectrum-Sharing Massive MIMO Systems with Active Eavesdropping
    S. Timilsina, G. Amarasuriya Aruma Baduge, and R. F. Schaefer
    IEEE Transactions on Cognitive Communications and Networking, vol. 4, no. 2, pp. 390-405, June 2018

  23. Secure and Reliable Key Agreement with Physical Unclonable Functions
    O. Günlü, T. Kernetzky, O. Iscan, V. Sidorenko, G. Kramer, and R. F. Schaefer
    Entropy - Special Issue ‘‘Information-Theoretic Security’’, vol. 20, no. 5, pp. 340, May 2018, invited.

  24. Optimal Transmit Antenna Selection for Massive MIMO Wiretap Channels
    S. Asaad, A. Bereyhi, A. M. Rabiei, R. R. Müller, and R. F. Schaefer
    IEEE Journal on Selected Areas in Communications - Special Issue ‘‘Physical Layer Security for 5G Wireless Networks’’, vol. 36, no. 4, pp. 817-828, Apr. 2018. (Preprint available on https://arxiv.org/abs/1803.01372)

  25. Secure Broadcasting Using Independent Secret Keys
    R. F. Schaefer, A. Khisti, and H. V. Poor
    IEEE Transactions on Communications, vol. 66, no. 2, pp. 644-661, Feb. 2018, invited. (Preprint available on http://arxiv.org/abs/1706.05861)

  26. Full-Duplex Relaying with Improper Gaussian Signaling over Nakagami-m Fading Channels
    M. Gaafar, M. G. Khafagy, O. Amin, R. F. Schaefer, and M.-S. Alouini
    IEEE Transactions on Communications, vol. 66, no. 1, pp. 64-78, Jan. 2018. (Preprint available on http://arxiv.org/abs/1704.06640)

  27. Robust Biometric Authentication from an Information Theoretic Perspective
    A. Grigorescu, H. Boche, and R. F. Schaefer
    Entropy - Special Issue ‘‘Information-Theoretic Security’’, vol. 19, no. 9, pp. 480, Sep. 2017, invited.

  28. Artificial Noise Aided Physical Layer Security in Underlay Cognitive Massive MIMO Systems with Pilot Contamination
    H. Al-Hraishawi, G. Amarasuriya Aruma Baduge, and R. F. Schaefer
    Entropy - Special Issue ‘‘Network Information Theory’’, vol. 19, no. 7, pp. 349, July 2017, invited.

  29. Wireless Physical Layer Security
    H. V. Poor and R. F. Schaefer
    Proceedings of the National Academy of Sciences of the United States of America, vol. 114, no. 1, pp. 19-26, Jan. 2017.

  30. Secret-Key Generation Using Compound Sources and One-Way Public Communication
    N. Tavangaran, H. Boche, and R. F. Schaefer
    IEEE Transactions on Information Forensics and Security, vol. 12, no. 1, pp. 227-241, Jan. 2017. (Preprint available on http://arxiv.org/abs/1601.07513)

  31. On the Individual Secrecy Capacity Regions of the General, Degraded, and Gaussian Multi-Receiver Wiretap Broadcast Channel
    A. S. Mansour, R. F. Schaefer, and H. Boche
    IEEE Transactions on Information Forensics and Security, vol. 11, no. 9, pp. 2107-2122, Sep. 2016.

  32. Optimal Transmit Strategy for MISO Channels with Joint Sum and Per-antenna Power Constraints
    P. Cao, T. J. Oechtering, R. F. Schaefer, and M. Skoglund
    IEEE Transactions on Signal Processing, vol. 64, no. 16, pp. 4296-4306, Aug. 2016.

  33. Super-Activation as a Unique Feature of Secure Communication in Malicious Environments
    R. F. Schaefer, H. Boche, and H. V. Poor
    Information - Special Issue ‘‘Physical Layer Security in Wireless Networks’’, vol. 7, no. 2, pp. 24, May 2016, invited.

  34. Arbitrarily Varying Multiple Access Channels with Conferencing Encoders: List Decoding and Finite Coordination Resources
    H. Boche and R. F. Schaefer
    Advances in Mathematics of Communications, vol. 10, no. 2, pp. 333-354, May 2016.

  35. On the SNR-Evolution of the MMSE Function of Codes for the Gaussian Broadcast and Wiretap Channels
    R. Bustin, R. F. Schaefer, H. V. Poor, and S. Shamai (Shitz)
    IEEE Transactions on Information Theory, vol. 62, no. 4, pp. 2070-2091, Apr. 2016. (Preprint available on http://arxiv.org/abs/1501.05994)

  36. On the Continuity of the Secrecy Capacity of Compound and Arbitrarily Varying Wiretap Channels
    H. Boche, R. F. Schaefer, and H. V. Poor
    IEEE Transactions on Information Forensics and Security, vol. 10, no. 12, pp. 2531-2546, Dec. 2015. (Preprint available on http://arxiv.org/abs/1409.4752)

  37. Secure Communication under Channel Uncertainty and Adversarial Attacks
    R. F. Schaefer, H. Boche, and H. V. Poor
    Proceedings of the IEEE, vol. 103, no. 10, pp. 1796-1813, Oct. 2015.

  38. The Secrecy Capacity of Compound MIMO Gaussian Channels
    R. F. Schaefer and S. Loyka
    IEEE Transactions on Information Theory, vol. 61, no. 10, pp. 5535-5552, Oct. 2015. (Preprint available on http://arxiv.org/abs/1509.02182)

  39. Robust Broadcasting of Common and Confidential Messages over Compound Channels: Strong Secrecy and Decoding Performance
    R. F. Schaefer and H. Boche
    IEEE Transactions on Information Forensics and Security, vol. 9, no. 10, pp. 1720-1732, Oct. 2014.

  40. List Decoding for Arbitrarily Varying Broadcast Channels With Receiver Side Information
    R. F. Schaefer and H. Boche
    IEEE Transactions on Information Theory, vol. 60, no. 8, pp. 4472-4487, Aug. 2014.

  41. Physical Layer Service Integration in Wireless Networks - Signal Processing Challenges
    R. F. Schaefer and H. Boche
    IEEE Signal Processing Magazine, vol. 31, no. 3, pp. 147-156, May 2014.

  42. Polar Coding for Bidirectional Broadcast Channels with Common and Confidential Messages
    M. Andersson, R. F. Schaefer, T. J. Oechtering, and M. Skoglund
    IEEE Journal on Selected Areas in Communications - Signal Processing Techniques for Wireless Physical Layer Security, vol. 31, no. 9, pp. 1901-1908, Sep. 2013.

  43. Capacity Results and Super-Activation for Wiretap Channels with Active Wiretappers
    H. Boche and R. F. Schaefer
    IEEE Transactions on Information Forensics and Security, vol. 8, no. 9, pp. 1482-1496, Sep. 2013.

  44. Wiretap Channels with Side Information - Strong Secrecy Capacity and Optimal Transceiver Design
    H. Boche and R. F. Schaefer
    IEEE Transactions on Information Forensics and Security, vol. 8, no. 8, pp. 1397-1408, Aug. 2013.

  45. Strong Secrecy in Bidirectional Broadcast Channels with Confidential Messages
    R. F. Wyrembelski, M. Wiese, and H. Boche
    IEEE Transactions on Information Forensics and Security, vol. 8, no. 2, pp. 324-334, Feb. 2013.

  46. Physical Layer Integration of Private, Common, and Confidential Messages in Bidirectional Relay Networks
    R. F. Wyrembelski and H. Boche
    IEEE Transactions on Wireless Communications, vol. 11, no. 9, pp. 3170-3179, Sep. 2012.

  47. Impact of Interference in Coexisting Wireless Networks with Applications to Arbitrarily Varying Bidirectional Broadcast Channels
    R. F. Wyrembelski and H. Boche
    Entropy - Special Issue ‘‘Information Theory Applied to Communications and Networking’’, vol. 14, no. 8, pp. 1357-1398, Aug. 2012, invited.

  48. Privacy in Bidirectional Relay Networks
    R. F. Wyrembelski and H. Boche
    IEEE Transactions on Communications, vol. 60, no. 6, pp. 1659-1668, June 2012.

  49. MIMO Gaussian Bidirectional Broadcast Channels with Common Messages
    R. F. Wyrembelski, T. J. Oechtering, and H. Boche
    IEEE Transactions on Wireless Communications, vol. 10, no. 9, pp. 2950-2959, Sep. 2011.

  50. Optimal Coding Strategies for Bidirectional Broadcast Channels Under Channel Uncertainty
    R. F. Wyrembelski, I. Bjelakovic, T. J. Oechtering, and H. Boche
    IEEE Transactions on Communications, vol. 58, no. 10, pp. 2984-2994, Oct. 2010.

  51. On the Optimal Transmit Strategy for the MIMO Bidirectional Broadcast Channel
    T. J. Oechtering, E. A. Jorswieck, R. F. Wyrembelski, and H. Boche
    IEEE Transactions on Communications, vol. 57, no. 12, pp. 3817-3826, Dec. 2009.

  52. Multiantenna Bidirectional Broadcast Channels - Optimal Transmit Strategies
    T. J. Oechtering, R. F. Wyrembelski, and H. Boche
    IEEE Transactions on Signal Processing, vol. 57, no. 5, pp. 1948-1958, May 2009.