Seguir
Eric Graves
Eric Graves
Army Research Lab
Dirección de correo verificada de army.mil
Título
Citado por
Citado por
Año
Radar remote monitoring of vital signs
C Li, J Cummings, J Lam, E Graves, W Wu
Microwave Magazine, IEEE 10 (1), 47-56, 2009
2962009
Keyless authentication in the presence of a simultaneously transmitting adversary
E Graves, P Yu, P Spasojevic
2016 IEEE Information Theory Workshop (ITW), 201-205, 2016
152016
A coding approach to guarantee information integrity against a Byzantine relay
E Graves, TF Wong
2013 IEEE International Symposium on Information Theory, 2780-2784, 2013
132013
Detection of channel degradation attack by Intermediary Node in Linear Networks
E Graves, TF Wong
INFOCOM, 2012 Proceedings IEEE, 747-755, 2012
132012
Inner bound for the capacity region of noisy channels with an authentication requirement
J Perazzone, E Graves, P Yu, R Blum
2018 IEEE International Symposium on Information Theory (ISIT), 126-130, 2018
122018
Inducing information stability to obtain information theoretic necessary requirements
E Graves, TF Wong
IEEE Transactions on Information Theory, 2019
11*2019
Detecting substitution attacks against non-colluding relays
R Cao, E Graves, TF Wong, T Lv
Global Communications Conference (GLOBECOM), 2013 IEEE, 1856-1861, 2013
112013
Authentication Against a Myopic Adversary
A Beemer, O Kosut, J Kliewer, E Graves, P Yu
2019 IEEE Conference on Communications and Network Security (CNS), 1-5, 2019
102019
Detectability of Symbol Manipulation by an Amplify-and-Forward Relay
E Graves, T Wong
arXiv preprint arXiv:1205.2681, 2012
102012
Authentication and Partial Message Correction over Adversarial Multiple-Access Channels
A Beemer, E Graves, J Kliewer, O Kosut, P Yu
2020 IEEE Conference on Communications and Network Security (CNS), 1-6, 2020
82020
Structured Coding for Authentication in the Presence of a Malicious Adversary
A Beemer, O Kosut, J Kliewer, E Graves, P Yu
2019 IEEE International Symposium on Information Theory (ISIT), 617-621, 2019
82019
Authentication with Mildly Myopic Adversaries
A Beemer, E Graves, J Kliewer, O Kosut, P Yu
2020 IEEE International Symposium on Information Theory (ISIT), 984-989, 2020
52020
Secret sharing in fast fading channels using obfuscated incremental-redundancy hybrid ARQ
CW Wong, E Graves, JM Shea, TF Wong
Military Communications Conference, 2009. MILCOM 2009. IEEE, 1-7, 2009
52009
Wiretap channel capacity: Secrecy criteria, strong converse, and phase change
E Graves, TF Wong
arXiv preprint arXiv:1701.07347, 2017
42017
Equating the achievable exponent region to the achievable entropy region by partitioning the source
E Graves, TF Wong
2014 IEEE International Symposium on Information Theory, 1346-1350, 2014
42014
Estimating Link Packet Rates From Partial CSMA/CA Network Observations
Y Cheng, E Graves, A Swami, A Sabharwal
2021 55th Asilomar Conference on Signals, Systems, and Computers, 772-779, 2021
32021
Messages per secret bit when authentication and a min-entropy secrecy criterion are required
E Graves, B Kirby, P Yu
2017 51st Annual Conference on Information Sciences and Systems (CISS), 1-6, 2017
32017
Information stabilization of images over discrete memoryless channels
E Graves, TF Wong
2016 IEEE International Symposium on Information Theory (ISIT), 2619-2623, 2016
32016
Adaptive Monitoring for Analytics Placement in Tactical Networks
J Corcoran, E Graves, B Dawson, M Dwyer, P Yu, K Chan
MILCOM 2022-2022 IEEE Military Communications Conference (MILCOM), 926-931, 2022
22022
Secret Key-Enabled Authenticated-Capacity Region, Part II: Typical-Authentication
E Graves, JB Perazzone, P Yu, R Blum
IEEE Transactions on Information Theory, 2022
2*2022
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20