default search action
Ashish Khisti
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j77]Ali Ramezani-Kebrya, Kimon Antonakopoulos, Volkan Cevher, Ashish Khisti, Ben Liang:
On the Generalization of Stochastic Gradient Descent with Momentum. J. Mach. Learn. Res. 25: 22:1-22:56 (2024) - [j76]Sadaf Salehkalaibar, Jun Chen, Ashish Khisti, Wei Yu:
Rate-Distortion-Perception Tradeoff Based on the Conditional-Distribution Perception Measure. IEEE Trans. Inf. Theory 70(12): 8432-8454 (2024) - [c118]Buu Phan, Ashish Khisti, Christos Louizos:
Importance Matching Lemma for Lossy Compression with Side Information. AISTATS 2024: 1387-1395 - [c117]Jingjing Qian, Sadaf Salehkalaibar, Jun Chen, Ashish Khisti, Wei Yu, Wuxian Shi, Yiqun Ge, Wen Tong:
Rate-Distortion-Perception Function of Gaussian Vector Sources. ISIT (Workshops) 2024: 1-6 - [c116]Ashish Khisti, Arash Behboodi, Gabriele Cesa, Kumar Pratik:
Unequal Message Protection: One-Shot analysis via Poisson Matching Lemma. ISIT 2024: 629-634 - [c115]Sadaf Salehkalaibar, Jun Chen, Ashish Khisti, Wei Yu:
Rate-Distortion-Perception Tradeoff for Lossy Compression Using Conditional Perception Measure. ISIT 2024: 1071-1076 - [c114]Muhammad Ahmad Kaleem, Gustavo Kasper Facenda, Ashish Khisti:
Subset Adaptive Relaying for Streaming Erasure Codes. ISIT 2024: 1997-2002 - [c113]Shuangyi Chen, Yue Ju, Zhongwen Zhu, Ashish Khisti:
Secure Inference for Vertically Partitioned Data Using Multiparty Homomorphic Encryption. ISIT 2024: 2508-2513 - [i80]Buu Phan, Ashish Khisti, Christos Louizos:
Importance Matching Lemma for Lossy Compression with Side Information. CoRR abs/2401.02609 (2024) - [i79]Sadaf Salehkalaibar, Jun Chen, Ashish Khisti, Wei Yu:
Rate-Distortion-Perception Tradeoff Based on the Conditional-Distribution Perception Measure. CoRR abs/2401.12207 (2024) - [i78]Muhammad Ahmad Kaleem, Gustavo Kasper Facenda, Ashish Khisti:
Subset Adaptive Relaying for Streaming Erasure Codes. CoRR abs/2401.15056 (2024) - [i77]Shuangyi Chen, Ashish Khisti:
SECO: Secure Inference With Model Splitting Across Multi-Server Hierarchy. CoRR abs/2404.16232 (2024) - [i76]Shuangyi Chen, Yue Ju, Zhongwen Zhu, Ashish Khisti:
Secure Inference for Vertically Partitioned Data Using Multiparty Homomorphic Encryption. CoRR abs/2405.03775 (2024) - [i75]Jun Chen, Yong Fang, Ashish Khisti, Ayfer Özgür, Nir Shlezinger, Chao Tian:
Information Compression in the AI Era: Recent Advances and Future Challenges. CoRR abs/2406.10036 (2024) - [i74]Jingjing Qian, Sadaf Salehkalaibar, Jun Chen, Ashish Khisti, Wei Yu, Wuxian Shi, Yiqun Ge, Wen Tong:
Rate-Distortion-Perception Tradeoff for Gaussian Vector Sources. CoRR abs/2406.18008 (2024) - [i73]Shuangyi Chen, Yue Ju, Hardik Dalal, Zhongwen Zhu, Ashish Khisti:
Robust Federated Finetuning of Foundation Models via Alternating Minimization of LoRA. CoRR abs/2409.02346 (2024) - [i72]Ashish Khisti, Mohammadreza Ebrahimi, Hassan Dbouk, Arash Behboodi, Roland Memisevic, Christos Louizos:
Multi-Draft Speculative Sampling: Canonical Architectures and Theoretical Limits. CoRR abs/2410.18234 (2024) - [i71]M. Reza Ebrahimi, Jun Chen, Ashish Khisti:
Minimum Entropy Coupling with Bottleneck. CoRR abs/2410.21666 (2024) - 2023
- [j75]Gustavo Kasper Facenda, Ashish Khisti, Wai-Tian Tan, John G. Apostolopoulos:
Deep Reinforcement Learning for Latency-Sensitive Communication With Adaptive Redundant Retransmissions. IEEE Trans. Commun. 71(5): 2771-2783 (2023) - [j74]Gustavo Kasper Facenda, Elad Domanovitz, Ashish Khisti, Wai-Tian Tan, John G. Apostolopoulos:
Streaming Erasure Codes Over Multi-Access Relayed Networks. IEEE Trans. Inf. Theory 69(2): 860-885 (2023) - [j73]Gustavo Kasper Facenda, M. Nikhil Krishnan, Elad Domanovitz, Silas L. Fong, Ashish Khisti, Wai-Tian Tan, John G. Apostolopoulos:
Adaptive Relaying for Streaming Erasure Codes in a Three Node Relay Network. IEEE Trans. Inf. Theory 69(7): 4345-4360 (2023) - [c112]MohammadReza Ebrahimi, Navona Calarco, Colin Hawco, Aristotle N. Voineskos, Ashish Khisti:
Time-Resolved FMRI Shared Response Model Using Gaussian Process Factor Analysis. ICASSP 2023: 1-5 - [c111]Muralee Nikhil Krishnan, MohammadReza Ebrahimi, Ashish J. Khisti:
Sequential Gradient Coding For Straggler Mitigation. ICLR 2023 - [c110]Daniel Severo, James Townsend, Ashish J. Khisti, Alireza Makhzani:
One-Shot Compression of Large Edge-Exchangeable Graphs using Bits-Back Coding. ICML 2023: 30633-30645 - [c109]Shuangyi Chen, Anuja Modi, Shweta Agrawal, Ashish Khisti:
Quadratic Functional Encryption for Secure Training in Vertical Federated Learning. ISIT 2023: 60-65 - [c108]Gustavo Kasper Facenda, Ashish Khisti, Wai-Tian Tan, John G. Apostolopoulos:
Streaming Erasure Codes over Multicast Relayed Networks. ISIT 2023: 114-119 - [c107]Sadaf Salehkalaibar, Buu Phan, Jun Chen, Wei Yu, Ashish Khisti:
On the choice of Perception Loss Function for Learned Video Compression. NeurIPS 2023 - [i70]Shuangyi Chen, Anuja Modi, Shweta Agrawal, Ashish Khisti:
Quadratic Functional Encryption for Secure Training in Vertical Federated Learning. CoRR abs/2305.08358 (2023) - [i69]Daniel Severo, James Townsend, Ashish Khisti, Alireza Makhzani:
Random Edge Coding: One-Shot Bits-Back Coding of Large Labeled Graphs. CoRR abs/2305.09705 (2023) - [i68]Sadaf Salehkalaibar, Buu Phan, Jun Chen, Wei Yu, Ashish Khisti:
On the Choice of Perception Loss Function for Learned Video Compression. CoRR abs/2305.19301 (2023) - 2022
- [j72]Huan Liu, George Zhang, Jun Chen, Ashish Khisti:
Cross-Domain Lossy Compression as Entropy Constrained Optimal Transport. IEEE J. Sel. Areas Inf. Theory 3(3): 513-527 (2022) - [j71]Daniel Severo, James Townsend, Ashish Khisti, Alireza Makhzani, Karen Ullrich:
Compressing Multisets With Large Alphabets. IEEE J. Sel. Areas Inf. Theory 3(4): 605-615 (2022) - [j70]Elad Domanovitz, Silas L. Fong, Ashish Khisti:
An Explicit Rate-Optimal Streaming Code for Channels With Burst and Arbitrary Erasures. IEEE Trans. Inf. Theory 68(1): 47-65 (2022) - [j69]Silas L. Fong, Ashish Khisti, Baochun Li, Wai-Tian Tan, Xiaoqing Zhu, John G. Apostolopoulos:
Corrections to "Optimal Streaming Erasure Codes Over the Three-Node Relay Network". IEEE Trans. Inf. Theory 68(10): 6527 (2022) - [j68]Elad Domanovitz, Ashish Khisti, Wai-Tian Tan, Xiaoqing Zhu, John G. Apostolopoulos:
State-Dependent Symbol-Wise Decode and Forward Codes Over Multihop Relay Networks. IEEE Trans. Inf. Theory 68(11): 7077-7095 (2022) - [j67]Salma Emara, Silas L. Fong, Baochun Li, Ashish Khisti, Wai-Tian Tan, Xiaoqing Zhu, John G. Apostolopoulos:
Low-Latency Network-Adaptive Error Control for Interactive Streaming. IEEE Trans. Multim. 24: 1691-1706 (2022) - [c106]Daniel Severo, James Townsend, Ashish Khisti, Alireza Makhzani, Karen Ullrich:
Compressing Multisets with Large Alphabets. DCC 2022: 322-331 - [c105]Elad Domanovitz, Daniel Severo, Ashish Khisti, Wei Yu:
Data-Driven Optimization for Zero-Delay Lossy Source Coding with Side Information. ICASSP 2022: 5203-5207 - [c104]Huan Liu, George Zhang, Jun Chen, Ashish J. Khisti:
Lossy Compression with Distribution Shift as Entropy Constrained Optimal Transport. ICLR 2022 - [c103]Gustavo Kasper Facenda, Elad Domanovitz, M. Nikhil Krishnan, Ashish Khisti, Silas L. Fong, Wai-Tian Tan, John G. Apostolopoulos:
On State-Dependent Streaming Erasure Codes over the Three-Node Relay Network. ISIT 2022: 1951-1956 - [i67]Gustavo Kasper Facenda, Elad Domanovitz, Ashish Khisti, Wai-Tian Tan, John G. Apostolopoulos:
Error-correcting codes for low latency streaming over multiple link relay networks. CoRR abs/2201.06609 (2022) - [i66]Kuan-Chieh Wang, Yan Fu, Ke Li, Ashish Khisti, Richard S. Zemel, Alireza Makhzani:
Variational Model Inversion Attacks. CoRR abs/2201.10787 (2022) - [i65]Gustavo Kasper Facenda, M. Nikhil Krishnan, Elad Domanovitz, Silas L. Fong, Ashish Khisti, Wai-Tian Tan, John G. Apostolopoulos:
Adaptive relaying for streaming erasure codes in a three node relay network. CoRR abs/2203.05102 (2022) - [i64]M. Nikhil Krishnan, MohammadReza Ebrahimi, Ashish Khisti:
Sequential Gradient Coding For Straggler Mitigation. CoRR abs/2211.13802 (2022) - 2021
- [j66]M. Nikhil Krishnan, Erfan Hosseini, Ashish Khisti:
Coded Sequential Matrix Multiplication for Straggler Mitigation. IEEE J. Sel. Areas Inf. Theory 2(3): 830-844 (2021) - [j65]M. Nikhil Krishnan, Erfan Hosseini, Ashish Khisti:
Sequential Gradient Coding for Packet-Loss Networks. IEEE J. Sel. Areas Inf. Theory 2(3): 919-930 (2021) - [j64]Mahdi Haghifam, M. Nikhil Krishnan, Ashish Khisti, Xiaoqing Zhu, Wai-Tian Tan, John G. Apostolopoulos:
On Streaming Codes With Unequal Error Protection. IEEE J. Sel. Areas Inf. Theory 2(4): 1165-1179 (2021) - [j63]Mahdi Haghifam, Vincent Y. F. Tan, Ashish Khisti:
Sequential Classification With Empirically Observed Statistics. IEEE Trans. Inf. Theory 67(5): 3095-3113 (2021) - [c102]Erfan Hosseini, Ashish Khisti:
Secure Aggregation in Federated Learning via Multiparty Homomorphic Encryption. GLOBECOM (Workshops) 2021: 1-6 - [c101]Yangjun Ruan, Karen Ullrich, Daniel Severo, James Townsend, Ashish Khisti, Arnaud Doucet, Alireza Makhzani, Chris J. Maddison:
Improving Lossless Compression Rates via Monte Carlo Bits-Back Coding. ICML 2021: 9136-9147 - [c100]Gustavo Kasper Facenda, Elad Domanovitz, Ashish Khisti, Wai-Tian Tan, John G. Apostolopoulos:
Streaming Erasure Codes over Multi-Access Relay Networks. ISIT 2021: 724-729 - [c99]Elad Domanovitz, Gustavo Kasper Facenda, Ashish Khisti, Wai-Tian Tan, John G. Apostolopoulos:
Guaranteed Rate of Streaming Erasure Codes over Multi-Link Multi-hop Network. ITW 2021: 1-6 - [c98]M. Nikhil Krishnan, Gustavo Kasper Facenda, Elad Domanovitz, Ashish Khisti, Wai-Tian Tan, John G. Apostolopoulos:
High Rate Streaming Codes Over the Three-Node Relay Network. ITW 2021: 1-6 - [c97]Kuan-Chieh Wang, Yan Fu, Ke Li, Ashish Khisti, Richard S. Zemel, Alireza Makhzani:
Variational Model Inversion Attacks. NeurIPS 2021: 9706-9719 - [c96]George Zhang, Jingjing Qian, Jun Chen, Ashish Khisti:
Universal Rate-Distortion-Perception Representations for Lossy Compression. NeurIPS 2021: 11517-11529 - [i63]Gustavo Kasper Facenda, Elad Domanovitz, Ashish Khisti, Wai-Tian Tan, John G. Apostolopoulos:
Streaming Erasure Codes over the Multiple Access Relay Channel. CoRR abs/2101.11117 (2021) - [i62]Yangjun Ruan, Karen Ullrich, Daniel Severo, James Townsend, Ashish Khisti, Arnaud Doucet, Alireza Makhzani, Chris J. Maddison:
Improving Lossless Compression Rates via Monte Carlo Bits-Back Coding. CoRR abs/2102.11086 (2021) - [i61]Louis Tan, Kaveh Mahdaviani, Ashish Khisti:
Markov Rewards Processes with Impulse Rewards and Absorbing States. CoRR abs/2105.00330 (2021) - [i60]Louis Tan, Kaveh Mahdaviani, Ashish Khisti:
Two-terminal Erasure Source-Broadcast with Feedback. CoRR abs/2105.00332 (2021) - [i59]Louis Tan, Kaveh Mahdaviani, Ashish Khisti:
Three-terminal Erasure Source-Broadcast with Feedback. CoRR abs/2105.00353 (2021) - [i58]George Zhang, Jingjing Qian, Jun Chen, Ashish Khisti:
Universal Rate-Distortion-Perception Representations for Lossy Compression. CoRR abs/2106.10311 (2021) - [i57]Daniel Severo, James Townsend, Ashish Khisti, Alireza Makhzani, Karen Ullrich:
Compressing Multisets with Large Alphabets. CoRR abs/2107.09202 (2021) - [i56]Daniel Severo, Elad Domanovitz, Ashish Khisti:
Regularized Classification-Aware Quantization. CoRR abs/2107.09716 (2021) - 2020
- [j62]Damian Dudzicz, Silas L. Fong, Ashish Khisti:
An Explicit Construction of Optimal Streaming Codes for Channels With Burst and Arbitrary Erasures. IEEE Trans. Commun. 68(1): 12-25 (2020) - [j61]Silas L. Fong, Ashish Khisti, Baochun Li, Wai-Tian Tan, Xiaoqing Zhu, John G. Apostolopoulos:
Optimal Streaming Erasure Codes Over the Three-Node Relay Network. IEEE Trans. Inf. Theory 66(5): 2696-2712 (2020) - [j60]Silas L. Fong, Ashish Khisti, Baochun Li, Wai-Tian Tan, Xiaoqing Zhu, John G. Apostolopoulos:
Optimal Multiplexed Erasure Codes for Streaming Messages With Different Decoding Delays. IEEE Trans. Inf. Theory 66(7): 4007-4018 (2020) - [c95]Elad Domanovitz, Ashish Khisti, Wai-Tian Tan, Xiaoqing Zhu, John G. Apostolopoulos:
Streaming Erasure Codes over Multi-hop Relay Network. ISIT 2020: 497-502 - [c94]Mahdi Haghifam, Jeffrey Negrea, Ashish Khisti, Daniel M. Roy, Gintare Karolina Dziugaite:
Sharpened Generalization Bounds based on Conditional Mutual Information and an Application to Noisy, Iterative Algorithms. NeurIPS 2020 - [c93]M. Nikhil Krishnan, Seyederfan Hosseini, Ashish Khisti:
Coded Sequential Matrix Multiplication For Straggler Mitigation. NeurIPS 2020 - [i55]Mahdi Haghifam, Jeffrey Negrea, Ashish Khisti, Daniel M. Roy, Gintare Karolina Dziugaite:
Sharpened Generalization Bounds based on Conditional Mutual Information and an Application to Noisy, Iterative Algorithms. CoRR abs/2004.12983 (2020) - [i54]MohammadReza Ebrahimi, Navona Calarco, Kieran Campbell, Colin Hawco, Aristotle N. Voineskos, Ashish Khisti:
Time-Resolved fMRI Shared Response Model using Gaussian Process Factor Analysis. CoRR abs/2006.05572 (2020) - [i53]Elad Domanovitz, Ashish Khisti, Wai-Tian Tan, Xiaoqing Zhu, John G. Apostolopoulos:
Streaming Erasure Codes over Multi-hop Relay Network. CoRR abs/2006.05951 (2020)
2010 – 2019
- 2019
- [j59]Kang-Hee Cho, Si-Hyeon Lee, Ashish Khisti:
Effect of User Cooperation on Smart Meter Privacy With Rechargeable Batteries. IEEE Signal Process. Lett. 26(7): 971-975 (2019) - [j58]Anatoly Khina, Victoria Kostina, Ashish Khisti, Babak Hassibi:
Tracking and Control of Gauss-Markov Processes over Packet-Drop Channels with Acknowledgments. IEEE Trans. Control. Netw. Syst. 6(2): 549-560 (2019) - [j57]Kaveh Mahdaviani, Ashish Khisti, Soheil Mohajer:
Bandwidth Adaptive & Error Resilient MBR Exact Repair Regenerating Codes. IEEE Trans. Inf. Theory 65(5): 2736-2759 (2019) - [j56]Silas L. Fong, Ashish Khisti, Baochun Li, Wai-Tian Tan, Xiaoqing Zhu, John G. Apostolopoulos:
Optimal Streaming Codes for Channels With Burst and Arbitrary Erasures. IEEE Trans. Inf. Theory 65(7): 4274-4292 (2019) - [c92]Tianrui Xiao, Ashish Khisti:
Maximal Information Leakage based Privacy Preserving Data Disclosure Mechanisms. CWIT 2019: 1-6 - [c91]Silas L. Fong, Ashish Khisti, Baochun Li, Wai-Tian Tan, Xiaoqing Zhu, John G. Apostolopoulos:
Optimal Streaming Erasure Codes over the Three-Node Relay Network. ISIT 2019: 3077-3081 - [c90]Silas L. Fong, Ashish Khisti, Baochun Li, Wai-Tian Tan, Xiaoqing Zhu, John G. Apostolopoulos:
Optimal Multiplexed Erasure Codes for Streaming Messages with Different Decoding Delays. ISIT 2019: 3082-3086 - [c89]Elad Domanovitz, Silas L. Fong, Ashish Khisti:
An Explicit Rate-Optimal Streaming Code for Channels with Burst and Arbitrary Erasures. ITW 2019: 1-5 - [c88]Damian Dudzicz, Silas L. Fong, Ashish Khisti:
An Explicit Construction of Optimal Streaming Codes for Channels with Burst and Arbitrary Erasures. ITW 2019: 1-5 - [c87]Mahdi Haghifam, Vincent Y. F. Tan, Ashish Khisti:
Sequential Classification with Empirically Observed Statistics. ITW 2019: 1-5 - [c86]Silas L. Fong, Salma Emara, Baochun Li, Ashish Khisti, Wai-Tian Tan, Xiaoqing Zhu, John G. Apostolopoulos:
Low-Latency Network-Adaptive Error Control for Interactive Streaming. ACM Multimedia 2019: 438-446 - [c85]Jeffrey Negrea, Mahdi Haghifam, Gintare Karolina Dziugaite, Ashish Khisti, Daniel M. Roy:
Information-Theoretic Generalization Bounds for SGLD via Data-Dependent Estimates. NeurIPS 2019: 11013-11023 - [i52]Silas L. Fong, Ashish Khisti, Baochun Li, Wai-Tian Tan, Xiaoqing Zhu, John G. Apostolopoulos:
Optimal Multiplexed Erasure Codes for Streaming Messages with Different Decoding Delays. CoRR abs/1901.03769 (2019) - [i51]Damian Dudzicz, Silas L. Fong, Ashish Khisti:
An Explicit Construction of Optimal Streaming Codes for Channels with Burst and Arbitrary Erasures. CoRR abs/1903.07434 (2019) - [i50]Tianrui Xiao, Ashish Khisti:
Maximal Information Leakage based Privacy Preserving Data Disclosure Mechanisms. CoRR abs/1904.01147 (2019) - [i49]Elad Domanovitz, Silas L. Fong, Ashish Khisti:
An Explicit Rate-Optimal Streaming Code for Channels with Burst and Arbitrary Erasures. CoRR abs/1904.06212 (2019) - [i48]Silas L. Fong, Salma Emara, Baochun Li, Ashish Khisti, Wai-Tian Tan, Xiaoqing Zhu, John G. Apostolopoulos:
Low-Latency Network-Adaptive Error Control for Interactive Streaming. CoRR abs/1909.06709 (2019) - [i47]Jeffrey Negrea, Mahdi Haghifam, Gintare Karolina Dziugaite, Ashish Khisti, Daniel M. Roy:
Information-Theoretic Generalization Bounds for SGLD via Data-Dependent Estimates. CoRR abs/1911.02151 (2019) - [i46]Mahdi Haghifam, Vincent Y. F. Tan, Ashish Khisti:
Sequential Classification with Empirically Observed Statistics. CoRR abs/1912.01170 (2019) - 2018
- [j55]Yongpeng Wu, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, Xiqi Gao:
Guest Editorial Physical Layer Security for 5G Wireless Networks, Part I. IEEE J. Sel. Areas Commun. 36(4): 675-678 (2018) - [j54]Yongpeng Wu, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, Xiqi Gao:
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead. IEEE J. Sel. Areas Commun. 36(4): 679-695 (2018) - [j53]Yongpeng Wu, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, Xiqi Gao:
Guest Editorial Physical Layer Security for 5G Wireless Networks, Part II. IEEE J. Sel. Areas Commun. 36(7): 1363-1366 (2018) - [j52]Rafael F. Schaefer, Ashish Khisti, H. Vincent Poor:
Secure Broadcasting Using Independent Secret Keys. IEEE Trans. Commun. 66(2): 644-661 (2018) - [j51]Si-Hyeon Lee, Ligong Wang, Ashish Khisti, Gregory W. Wornell:
Covert Communication With Channel-State Information at the Transmitter. IEEE Trans. Inf. Forensics Secur. 13(9): 2310-2319 (2018) - [j50]Anatoly Khina, Yuval Kochman, Ashish Khisti:
The MIMO Wiretap Channel Decomposed. IEEE Trans. Inf. Theory 64(2): 1046-1063 (2018) - [j49]Kaveh Mahdaviani, Soheil Mohajer, Ashish Khisti:
Product Matrix MSR Codes With Bandwidth Adaptive Exact Repair. IEEE Trans. Inf. Theory 64(4): 3121-3135 (2018) - [j48]Simon Li, Ashish Khisti, Aditya Mahajan:
Information-Theoretic Privacy for Smart Metering Systems with a Rechargeable Battery. IEEE Trans. Inf. Theory 64(5): 3679-3695 (2018) - [j47]Ahmed Badr, Devin Lui, Ashish Khisti, Wai-Tian Tan, Xiaoqing Zhu, John G. Apostolopoulos:
Multiplexed Coding for Multiple Streams With Different Decoding Delays. IEEE Trans. Inf. Theory 64(6): 4365-4378 (2018) - [j46]Rafid Mahmood, Ahmed Badr, Ashish Khisti:
Streaming Codes for Multiplicative-Matrix Channels With Burst Rank Loss. IEEE Trans. Inf. Theory 64(7): 5296-5311 (2018) - [j45]Si-Hyeon Lee, Ashish Khisti:
The Wiretapped Diamond-Relay Channel. IEEE Trans. Inf. Theory 64(11): 7194-7207 (2018) - [c84]Silas L. Fong, Ashish Khisti, Baochun Li, Wai-Tian Tan, Xiaoqing Zhu, John G. Apostolopoulos:
Optimal Streaming Codes for Channels with Burst and Arbitrary Erasures. ISIT 2018: 1370-1374 - [i45]Silas L. Fong, Ashish Khisti, Baochun Li, Wai-Tian Tan, Xiaoqing Zhu, John G. Apostolopoulos:
Optimal Streaming Codes for Channels with Burst and Arbitrary Erasures. CoRR abs/1801.04241 (2018) - [i44]Yongpeng Wu, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, Xiqi Gao:
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead. CoRR abs/1801.05227 (2018) - [i43]Ali Ramezani-Kebrya, Ashish Khisti, Ben Liang:
On the Stability and Convergence of Stochastic Gradient Descent with Momentum. CoRR abs/1809.04564 (2018) - 2017
- [j44]Si-Hyeon Lee, Ashish Khisti:
The Gaussian Diamond-Wiretap Channel With Rate-Limited Relay Cooperation. IEEE Commun. Lett. 21(1): 338-341 (2017) - [j43]Yuhan Helena Liu, Si-Hyeon Lee, Ashish Khisti:
Information-Theoretic Privacy in Smart Metering Systems Using Cascaded Rechargeable Batteries. IEEE Signal Process. Lett. 24(3): 314-318 (2017) - [j42]Ahmed Badr, Ashish Khisti, Wai-Tian Tan, John G. Apostolopoulos:
Perfecting Protection for Interactive Multimedia: A survey of forward errror correction for low-delay interactive applications. IEEE Signal Process. Mag. 34(2): 95-113 (2017) - [j41]Ahmed Badr, Pratik Patil, Ashish Khisti, Wai-Tian Tan, John G. Apostolopoulos:
Layered Constructions for Low-Delay Streaming Codes. IEEE Trans. Inf. Theory 63(1): 111-141 (2017) - [j40]Si-Hyeon Lee, Wanyao Zhao, Ashish Khisti:
Secure Degrees of Freedom of the Gaussian Diamond-Wiretap Channel. IEEE Trans. Inf. Theory 63(1): 496-508 (2017) - [j39]Si-Hyeon Lee, Vincent Y. F. Tan, Ashish Khisti:
Exact Moderate Deviation Asymptotics in Streaming Data Transmission. IEEE Trans. Inf. Theory 63(5): 2726-2736 (2017) - [j38]Farrokh Etezadi, Ashish Khisti, Jun Chen:
A Truncated Prediction Framework for Streaming Over Erasure Channels. IEEE Trans. Inf. Theory 63(11): 7322-7351 (2017) - [c83]Yu Liu, Ashish Khisti, Aditya Mahajan:
On privacy in smart metering systems with periodically time-varying input distribution. GlobalSIP 2017: 513-517 - [c82]Ahmed Badr, Ashish Khisti, Wai-tian Tan, Xiaoqing Zhu, John G. Apostolopoulos:
FEC for VoIP using dual-delay streaming codes. INFOCOM 2017: 1-9 - [c81]Jun Chen, Farrokh Etezadi, Ashish Khisti:
Generalized Gaussian multiterminal source coding and probabilistic graphical models. ISIT 2017: 719-723 - [c80]Si-Hyeon Lee, Vincent Y. F. Tan, Ashish Khisti:
Exact moderate deviation asymptotics in streaming data transmission. ISIT 2017: 1252-1256 - [c79]Ahmed Badr, Devin Lui, Ashish Khisti, Wai-Tian Tan, Xiaoqing Zhu, John G. Apostolopoulos:
Multiplexed FEC for multiple streams with different playout deadlines. ISIT 2017: 1633-1637 - [c78]Si-Hyeon Lee, Ligong Wang, Ashish Khisti, Gregory W. Wornell:
Covert communication with noncausal channel-state information at the transmitter. ISIT 2017: 2830-2834 - [c77]Kaveh Mahdaviani, Soheil Mohajer, Ashish Khisti:
Product matrix minimum storage regenerating codes with flexible number of helpers. ITW 2017: 41-45 - [c76]Anatoly Khina, Victoria Kostina, Ashish Khisti, Babak Hassibi:
Sequential coding of Gauss-Markov sources with packet erasures and feedback. ITW 2017: 529-530 - [i42]Anatoly Khina, Ashish Khisti, Babak Hassibi:
Sequential Coding of Gauss-Markov Sources over Packet-Erasure Channels with Feedback. CoRR abs/1702.01779 (2017) - [i41]Rafael F. Schaefer, Ashish Khisti, H. Vincent Poor:
Secure Broadcasting Using Independent Secret Keys. CoRR abs/1706.05861 (2017) - [i40]Si-Hyeon Lee, Ligong Wang, Ashish Khisti, Gregory W. Wornell:
Covert Communication with Channel-State Information at the Transmitter. CoRR abs/1708.02501 (2017) - [i39]Kaveh Mahdaviani, Soheil Mohajer, Ashish Khisti:
Product Matrix MSR Codes with Bandwidth Adaptive Exact Repair. CoRR abs/1708.03402 (2017) - [i38]Kaveh Mahdaviani, Soheil Mohajer, Ashish Khisti:
Product Matrix Minimum Storage Regenerating Codes with Flexible Number of Helpers. CoRR abs/1708.06012 (2017) - [i37]Kaveh Mahdaviani, Ashish Khisti, Soheil Mohajer:
Bandwidth Adaptive & Error Resilient MBR Exact Repair Regenerating Codes. CoRR abs/1711.02770 (2017) - 2016
- [j37]Si-Hyeon Lee, Ashish Khisti:
The Gaussian Diamond-Wiretap Channel With Conferencing Relays. IEEE Commun. Lett. 20(7): 1393-1396 (2016) - [j36]Wanyao Zhao, Si-Hyeon Lee, Ashish Khisti:
Phase-Only Zero Forcing for Secure Communication With Multiple Antennas. IEEE J. Sel. Top. Signal Process. 10(8): 1334-1345 (2016) - [j35]Louis Tan, Yao Li, Ashish Khisti, Emina Soljanin:
Successive Segmentation-Based Coding for Broadcasting Over Erasure Channels. IEEE Trans. Inf. Theory 62(6): 3026-3038 (2016) - [j34]Rafid Mahmood, Ahmed Badr, Ashish Khisti:
Convolutional Codes With Maximum Column Sum Rank for Network Streaming. IEEE Trans. Inf. Theory 62(6): 3039-3052 (2016) - [j33]Si-Hyeon Lee, Vincent Y. F. Tan, Ashish Khisti:
Streaming Data Transmission in the Moderate Deviations and Central Limit Regimes. IEEE Trans. Inf. Theory 62(12): 6816-6830 (2016) - [j32]Yunhao Sun, Ruchen Duan, Yingbin Liang, Ashish Khisti, Shlomo Shamai Shitz:
Capacity Characterization for State-Dependent Gaussian Channel With a Helper. IEEE Trans. Inf. Theory 62(12): 7123-7134 (2016) - [j31]Ashish Khisti:
Secret-Key Agreement Over Non-Coherent Block-Fading Channels With Public Discussion. IEEE Trans. Inf. Theory 62(12): 7164-7178 (2016) - [j30]Amal Hyadi, Zouheir Rezki, Ashish Khisti, Mohamed-Slim Alouini:
Secure Broadcasting With Imperfect Channel State Information at the Transmitter. IEEE Trans. Wirel. Commun. 15(3): 2215-2230 (2016) - [c75]Simon Li, Ashish Khisti, Aditya Mahajan:
Privacy-optimal strategies for smart metering systems with a rechargeable battery. ACC 2016: 2080-2085 - [c74]Devin Lui, Ahmed Badr, Ashish Khisti, Wai-Tian Tan, Xiaoqing Zhu, John G. Apostolopoulos:
Joint FEC across Multiple Streams with Different Playout Deadlines. GLOBECOM Workshops 2016: 1-6 - [c73]Xiaoqing Zhu, Wai-tian Tan, John G. Apostolopoulos, Ahmed Badr, Ashish Khisti:
Content-independent and loss-pattern-aware distortion evaluation for streaming media. ICIP 2016: 1514-1518 - [c72]Kaveh Mahdaviani, Ashish Khisti, Soheil Mohajer:
Bandwidth adaptive & error resilient regenerating codes with minimum repair bandwidth. ISIT 2016: 235-239 - [c71]Yunhao Sun, Ruchen Duan, Yingbin Liang, Ashish Khisti, Shlomo Shamai:
Helper-assisted state cancelation for multiple access channels. ISIT 2016: 1496-1500 - [c70]Si-Hyeon Lee, Wanyao Zhao, Ashish Khisti:
Secure degrees of freedom of the Gaussian diamond-wiretap channel. ISIT 2016: 2819-2823 - [c69]Rafid Mahmood, Ahmed Badr, Ashish Khisti:
Low delay network streaming under burst losses. ISIT 2016: 2898-2902 - [c68]Si-Hyeon Lee, Vincent Y. F. Tan, Ashish Khisti:
Streaming data transmission in the moderate deviations and central limit regimes. ISIT 2016: 3072-3076 - [i36]Si-Hyeon Lee, Vincent Y. F. Tan, Ashish Khisti:
Exact Moderate Deviation Asymptotics in Streaming Data Transmission. CoRR abs/1604.06848 (2016) - [i35]Si-Hyeon Lee, Ashish Khisti:
The Wiretapped Diamond-Relay Channel. CoRR abs/1606.05954 (2016) - 2015
- [j29]Wanyao Zhao, David Yiwei Ding, Ashish Khisti:
Capacity Bounds for a Class of Diamond Networks With Conferencing Relays. IEEE Commun. Lett. 19(11): 1881-1884 (2015) - [j28]Ahmed Badr, Ashish Khisti, Wai-tian Tan, John G. Apostolopoulos:
Streaming Codes With Partial Recovery Over Channels With Burst and Isolated Erasures. IEEE J. Sel. Top. Signal Process. 9(3): 501-516 (2015) - [j27]Phillip A. Regalia, Ashish Khisti, Yingbin Liang, Stefano Tomasin:
Secure Communications via Physical-Layer and Information-Theoretic Techniques [Scanning the Issue]. Proc. IEEE 103(10): 1698-1701 (2015) - [j26]Si-Hyeon Lee, Ashish Khisti:
Degraded Gaussian Diamond-Wiretap Channel. IEEE Trans. Commun. 63(12): 5027-5038 (2015) - [j25]Ahmed Badr, Devin Lui, Ashish Khisti:
Streaming Codes for Multicast Over Burst Erasure Channels. IEEE Trans. Inf. Theory 61(8): 4181-4208 (2015) - [j24]Ruchen Duan, Yingbin Liang, Ashish Khisti, Shlomo Shamai Shitz:
State-Dependent Parallel Gaussian Networks With a Common State-Cognitive Helper. IEEE Trans. Inf. Theory 61(12): 6680-6699 (2015) - [c67]Si-Hyeon Lee, Ashish Khisti:
The degraded Gaussian diamond-wiretap channel. ISIT 2015: 106-110 - [c66]Wanyao Zhao, Ashish Khisti:
Gaussian wiretap channel with shared keys between transmitter and helpers. ISIT 2015: 1149-1153 - [c65]Farrokh Etezadi, Ashish Khisti, Jun Chen:
Price of perfection: Limited prediction for streaming over erasure channels. ISIT 2015: 1392-1396 - [c64]Farrokh Etezadi, Ashish Khisti:
Delay-constrained streaming of Gauss-Markov sources over erasure channels. ISIT 2015: 1397-1401 - [c63]Rafael F. Schaefer, Ashish Khisti, H. Vincent Poor:
How to use independent secret keys for secure broadcasting of common messages. ISIT 2015: 1971-1975 - [c62]Anatoly Khina, Yuval Kochman, Ashish Khisti:
The confidential MIMO broadcast capacity: A simple derivation. ISIT 2015: 1981-1985 - [c61]Louis Tan, Kaveh Mahdaviani, Ashish Khisti, Emina Soljanin:
Coding for source-broadcasting over erasure channels with feedback. ISIT 2015: 2136-2140 - [c60]Rafid Mahmood, Ahmed Badr, Ashish Khisti:
Convolutional codes with maximum column sum rank for network streaming. ISIT 2015: 2271-2275 - [c59]Ahmed Badr, Rafid Mahmood, Ashish Khisti:
Embedded MDS codes for multicast streaming. ISIT 2015: 2276-2280 - [c58]Kaveh Mahdaviani, Ashish Khisti, Gauri Joshi, Gregory W. Wornell:
Playback delay in on-demand streaming communication with feedback. ISIT 2015: 2281-2285 - [c57]Simon Li, Ashish Khisti, Aditya Mahajan:
Structure of optimal privacy-preserving policies in smart-metered systems with a rechargeable battery. SPAWC 2015: 375-379 - [i34]Si-Hyeon Lee, Ashish Khisti:
The Degraded Gaussian Diamond-Wiretap Channel. CoRR abs/1504.05900 (2015) - [i33]Rafid Mahmood, Ahmed Badr, Ashish Khisti:
Convolutional Codes with Maximum Column Sum Rank for Network Streaming. CoRR abs/1506.03792 (2015) - [i32]Anatoly Khina, Yuval Kochman, Ashish Khisti:
The MIMO Wiretap Channel Decomposed. CoRR abs/1509.01822 (2015) - [i31]Simon Li, Ashish Khisti, Aditya Mahajan:
Privacy-Optimal Strategies for Smart Metering Systems with a Rechargeable Battery. CoRR abs/1510.07170 (2015) - [i30]Si-Hyeon Lee, Wanyao Zhao, Ashish Khisti:
Secure Degrees of Freedom of the Gaussian Diamond-Wiretap Channel. CoRR abs/1512.06291 (2015) - [i29]Si-Hyeon Lee, Vincent Y. F. Tan, Ashish Khisti:
Streaming Data Transmission in the Moderate Deviations and Central Limit Regimes. CoRR abs/1512.06298 (2015) - 2014
- [j23]Xiang He, Ashish Khisti, Aylin Yener:
MIMO Broadcast Channel with an Unknown Eavesdropper: Secrecy Degrees of Freedom. IEEE Trans. Commun. 62(1): 246-255 (2014) - [j22]Zouheir Rezki, Ashish Khisti, Mohamed-Slim Alouini:
On the Secrecy Capacity of the Wiretap Channel With Imperfect Main Channel Estimation. IEEE Trans. Commun. 62(10): 3652-3664 (2014) - [j21]Farrokh Etezadi, Ashish Khisti, Mitchell D. Trott:
Zero-Delay Sequential Transmission of Markov Sources Over Burst Erasure Channels. IEEE Trans. Inf. Theory 60(8): 4584-4613 (2014) - [j20]Ashish Khisti, Tie Liu:
Private Broadcasting Over Independent Parallel Channels. IEEE Trans. Inf. Theory 60(9): 5173-5187 (2014) - [j19]Ashish Khisti, Stark C. Draper:
The Streaming-DMT of Fading Channels. IEEE Trans. Inf. Theory 60(11): 7058-7072 (2014) - [j18]Zouheir Rezki, Ashish Khisti, Mohamed-Slim Alouini:
Ergodic Secret Message Capacity of the Wiretap Channel with Finite-Rate Feedback. IEEE Trans. Wirel. Commun. 13(6): 3364-3379 (2014) - [c56]Rafael F. Schaefer, Ashish Khisti:
Secure broadcasting of a common message with independent secret keys. CISS 2014: 1-6 - [c55]Amal Hyadi, Zouheir Rezki, Ashish Khisti, Mohamed-Slim Alouini:
On the secrecy capacity of the broadcast wiretap channel with imperfect channel state information. GLOBECOM 2014: 1608-1613 - [c54]Rafael F. Schaefer, Ashish Khisti, Holger Boche:
On the use of secret keys in broadcast channels with receiver side information. ICASSP 2014: 1582-1586 - [c53]Ruchen Duan, Yingbin Liang, Ashish Khisti, Shlomo Shamai:
State-dependent parallel Gaussian channels with a common helper in high power regime. ISIT 2014: 86-90 - [c52]Anatoly Khina, Yuval Kochman, Ashish Khisti:
Decomposing the MIMO wiretap channel. ISIT 2014: 206-210 - [c51]Yao Li, Louis Tan, Ashish Khisti, Emina Soljanin:
Successive segmentation-based coding for broadcasting over erasure channels. ISIT 2014: 2172-2176 - [c50]Ruchen Duan, Yingbin Liang, Ashish Khisti, Shlomo Shamai:
Dirty interference cancelation for multiple access channels. ISITA 2014: 463-467 - [c49]Ruchen Duan, Yingbin Liang, Ashish Khisti, Shlomo Shamai:
Dirty interference cancellation for Gaussian broadcast channels. ITW 2014: 551-555 - [c48]Anatoly Khina, Yuval Kochman, Ashish Khisti:
From ordinary AWGN codes to optimal MIMO wiretap schemes. ITW 2014: 631-635 - [i28]Ruchen Duan, Yingbin Liang, Ashish Khisti, Shlomo Shamai:
Parallel Gaussian Networks with a Common State-Cognitive Helper. CoRR abs/1404.6472 (2014) - [i27]Farrokh Etezadi, Ashish Khisti, Mitchell D. Trott:
Zero-Delay Sequential Transmission of Markov Sources Over Burst Erasure Channels. CoRR abs/1410.2326 (2014) - 2013
- [j17]Ashish Khisti, Dongye Zhang:
Artificial-Noise Alignment for Secure Multicast using Multiple Antennas. IEEE Commun. Lett. 17(8): 1568-1571 (2013) - [j16]Ashish Khisti, Brett Hern, Krishna R. Narayanan:
On Modulo-Sum Computation Over an Erasure Multiple-Access Channel. IEEE Trans. Inf. Theory 59(7): 4129-4138 (2013) - [j15]Xiang He, Ashish Khisti, Aylin Yener:
MIMO Multiple Access Channel With an Arbitrarily Varying Eavesdropper: Secrecy Degrees of Freedom. IEEE Trans. Inf. Theory 59(8): 4733-4745 (2013) - [j14]Weiwen Zhang, Yonggang Wen, Zhenzhong Chen, Ashish Khisti:
QoE-Driven Cache Management for HTTP Adaptive Bit Rate Streaming Over Wireless Networks. IEEE Trans. Multim. 15(6): 1431-1445 (2013) - [c47]Pratik Patil, Ahmed Badr, Ashish Khisti, Wai-Tian Tan:
Delay-optimal streaming codes under source-channel rate mismatch. ACSSC 2013: 2094-2099 - [c46]Louis Tan, Ashish Khisti, Emina Soljanin:
Distortion bounds for broadcasting a binary source over binary erasure channels. CWIT 2013: 49-54 - [c45]Pratik Patil, Ahmed Badr, Ashish Khisti:
Streaming erasure codes under mismatched source-channel frame rates. CWIT 2013: 153-157 - [c44]Ahmed Badr, Ashish Khisti, Wai-Tian Tan, John G. Apostolopoulos:
Robust streaming erasure codes using MDS constituent codes. CWIT 2013: 158-163 - [c43]Ahmed Badr, Ashish Khisti, Wai-Tian Tan, John G. Apostolopoulos:
Streaming codes for channels with burst and isolated erasures. INFOCOM 2013: 2850-2858 - [c42]Ahmed Badr, Ashish Khisti, Wai-Tian Tan, John G. Apostolopoulos:
Robust streaming erasure codes based on deterministic channel approximations. ISIT 2013: 1002-1006 - [c41]Farrokh Etezadi, Ashish Khisti:
Real-time streaming of Gauss-Markov sources over sliding window burst-erasure channels. ISIT 2013: 2169-2173 - [c40]Ashish Khisti, Amos Lapidoth:
Multiple access channels with intermittent feedback and side information. ISIT 2013: 2631-2635 - [c39]Ruchen Duan, Yingbin Liang, Ashish Khisti, Shlomo Shamai (Shitz):
State-dependent Gaussian Z-channel with mismatched side-information and interference. ITW 2013: 1-5 - [c38]Louis Tan, Yao Li, Ashish Khisti, Emina Soljanin:
Source broadcasting over erasure channels: Distortion bounds and code design. ITW 2013: 1-5 - [c37]Mattias Andersson, Ashish Khisti, Mikael Skoglund:
Secure key agreement over reciprocal fading channels in the low SNR regime. SPAWC 2013: 674-678 - [i26]Ashish Khisti, Stark C. Draper:
The Diversity-Multiplexing Tradeoff of Delay-Constrained Sequential Streaming. CoRR abs/1301.2180 (2013) - [i25]Ahmed Badr, Devin Lui, Ashish Khisti:
Streaming-Codes for Multicast over Burst Erasure Channels. CoRR abs/1303.4370 (2013) - [i24]Ahmed Badr, Ashish Khisti, Wai-Tian Tan, John G. Apostolopoulos:
Robust Streaming Erasure Codes based on Deterministic Channel Approximations. CoRR abs/1305.3596 (2013) - [i23]Ahmed Badr, Pratik Patil, Ashish Khisti, Wai-Tian Tan, John G. Apostolopoulos:
Layered Constructions for Low-Delay Streaming Codes. CoRR abs/1308.3827 (2013) - [i22]Xiang He, Ashish Khisti, Aylin Yener:
MIMO Broadcast Channel with an Unknown Eavesdropper: Secrecy Degrees of Freedom. CoRR abs/1311.2651 (2013) - 2012
- [j13]Ashish Khisti, Suhas N. Diggavi, Gregory W. Wornell:
Secret-Key Generation Using Correlated Sources and Channels. IEEE Trans. Inf. Theory 58(2): 652-670 (2012) - [c36]Ashish Khisti:
Interactive secret key generation over reciprocal fading channels. Allerton Conference 2012: 1374-1381 - [c35]Farrokh Etezadi, Ashish Khisti:
Real-time coding of Gauss-Markov sources over burst erasure channels. Allerton Conference 2012: 2037-2044 - [c34]Farrokh Etezadi, Ashish Khisti, Mitchell D. Trott:
Prospicient Real-Time Coding of Markov Sources over Burst Erasure Channels: Lossless Case. DCC 2012: 267-276 - [c33]Weiwen Zhang, Yonggang Wen, Zhenzhong Chen, Ashish Khisti:
QoE-driven cache management for HTTP adaptive bit rate (ABR) streaming over wireless networks. GLOBECOM 2012: 1951-1956 - [c32]Louis Tan, Ashish Khisti, Emina Soljanin:
Quadratic Gaussian source broadcast with individual bandwidth mismatches. ISIT 2012: 204-208 - [c31]Zouheir Rezki, Ashish Khisti, Mohamed-Slim Alouini:
On the ergodic secret message capacity of the wiretap channel with finite-rate feedback. ISIT 2012: 239-243 - [c30]Ashish Khisti, Tie Liu:
On private broadcasting over independent parallel channels. ISIT 2012: 433-437 - [c29]Ashish Khisti, Brett Hern, Krishna R. Narayanan:
On modulo-sum computation over an erasure multiple access channel. ISIT 2012: 3013-3017 - [c28]Mattias Andersson, Ashish Khisti, Mikael Skoglund:
Secret-key agreement over a non-coherent block-fading MIMO wiretap channel. ITW 2012: 153-157 - [i21]Farrokh Etezadi, Ashish Khisti, Mitchell D. Trott:
Sequential Coding of Markov Sources over Burst Erasure Channels. CoRR abs/1202.5259 (2012) - [i20]Xiang He, Ashish Khisti, Aylin Yener:
MIMO Multiple Access Channel with an Arbitrarily Varying Eavesdropper. CoRR abs/1203.1376 (2012) - [i19]Ashish Khisti, Brett Hern, Krishna R. Narayanan:
On Modulo-Sum Computation over an Erasure Multiple Access Channel. CoRR abs/1206.3138 (2012) - [i18]Ahmed Badr, Ashish Khisti, Wai-Tian Tan, John G. Apostolopoulos:
Streaming Codes for Channels with Burst and Isolated Erasures. CoRR abs/1208.0072 (2012) - [i17]Ashish Khisti:
Secret-Key Agreement Capacity over Reciprocal Fading Channels: A Separation Approach. CoRR abs/1211.1660 (2012) - [i16]Ashish Khisti, Dongye Zhang:
Artificial-Noise Alignment for Secure Multicast using Multiple Antennas. CoRR abs/1211.4649 (2012) - [i15]Ashish Khisti, Tie Liu:
Private Broadcasting over Independent Parallel Channels. CoRR abs/1212.6930 (2012) - 2011
- [j12]Ahmed Badr, Ashish Khisti, Emin Martinian:
Diversity Embedded Streaming Erasure Codes (DE-SCo): Constructions and Optimality. IEEE J. Sel. Areas Commun. 29(5): 1042-1054 (2011) - [j11]Anurag Agrawal, Zouheir Rezki, Ashish Khisti, Mohamed-Slim Alouini:
Noncoherent Capacity of Secret-Key Agreement With Public Discussion. IEEE Trans. Inf. Forensics Secur. 6(3-1): 565-574 (2011) - [j10]Ashish Khisti, Suhas N. Diggavi, Gregory W. Wornell:
Secret-Key Agreement With Channel State Information at the Transmitter. IEEE Trans. Inf. Forensics Secur. 6(3-1): 672-681 (2011) - [j9]Ashish Khisti:
Interference Alignment for the Multiantenna Compound Wiretap Channel. IEEE Trans. Inf. Theory 57(5): 2976-2993 (2011) - [j8]Tal Philosof, Ram Zamir, Uri Erez, Ashish Khisti:
Lattice Strategies for the Dirty Multiple Access Channel. IEEE Trans. Inf. Theory 57(8): 5006-5035 (2011) - [c27]Ashish Khisti:
Session MA2b: Delay sensitive communication. ACSCC 2011: 18-20 - [c26]Zhi Li, Ashish Khisti, Bernd Girod:
Correcting erasure bursts with minimum decoding delay. ACSCC 2011: 33-39 - [c25]Zouheir Rezki, Ashish Khisti, Mohamed-Slim Alouini:
On the ergodic secrecy capacity of the wiretap channel under imperfect main channel estimation. ACSCC 2011: 952-957 - [c24]Xiang He, Ashish Khisti, Aylin Yener:
MIMO multiple access channel with an arbitrarily varying eavesdropper. Allerton 2011: 1182-1189 - [c23]Xiang He, Ashish Khisti, Aylin Yener:
MIMO Broadcast Channel with Arbitrarily Varying Eavesdropper Channel: Secrecy Degrees of Freedom. GLOBECOM 2011: 1-5 - [c22]Ashish Khisti, Suhas N. Diggavi:
A remark on secret-key generation over correlated fading channels. GLOBECOM Workshops 2011: 864-868 - [c21]Aniketh Talwai, Francis Minhthang Bui, Ashish Khisti, Dimitrios Hatzinakos:
A comparative analysis of biometric secret-key binding schemes based on QIM and Wyner-Ziv coding. ICASSP 2011: 1924-1927 - [c20]David P. Varodayan, Ashish Khisti:
Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage. ICASSP 2011: 1932-1935 - [c19]Ashish Khisti, Stark C. Draper:
Streaming data over fading wireless channels: The diversity-multiplexing tradeoff. ISIT 2011: 1111-1115 - [c18]Stark C. Draper, Ashish Khisti:
Truncated tree codes for streaming data: Infinite-memory reliability using finite memory. ISWCS 2011: 136-140 - 2010
- [j7]Ashish Khisti, Gregory W. Wornell:
Secure transmission with multiple antennas I: the MISOME wiretap channel. IEEE Trans. Inf. Theory 56(7): 3088-3104 (2010) - [j6]Ashish Khisti, Gregory W. Wornell:
Secure Transmission With Multiple Antennas - Part II: The MIMOME Wiretap Channel. IEEE Trans. Inf. Theory 56(11): 5515-5532 (2010) - [c17]Ahmed Badr, Devin Lui, Ashish Khisti:
Multicast streaming codes (Mu-SCo) for burst erasure channels. Allerton 2010: 383-390 - [c16]Ahmed Badr, Ashish Khisti, Emin Martinian:
Diversity Embedded Streaming Erasure Codes (DE-SCo): Constructions and Optimality. GLOBECOM 2010: 1-5 - [c15]Ashish Khisti, Danilo Silva, Frank R. Kschischang:
Secure-broadcast codes over linear-deterministic channels. ISIT 2010: 555-559 - [c14]Ashish Khisti:
On the MISO compound wiretap channel. ITA 2010: 216-222 - [i14]Ashish Khisti:
Interference Alignment for the Multi-Antenna Compound Wiretap Channel. CoRR abs/1002.4548 (2010) - [i13]Ashish Khisti, Gregory W. Wornell:
Secure Transmission with Multiple Antennas II: The MIMOME Wiretap Channel. CoRR abs/1006.5879 (2010) - [i12]Ashish Khisti:
Secret key agreement on wiretap channels with transmitter side information. CoRR abs/1006.5901 (2010) - [i11]Ahmed Badr, Ashish Khisti, Emin Martinian:
Diversity Embedded Streaming Erasure Codes (DE-SCo): Constructions and Optimality. CoRR abs/1007.0522 (2010) - [i10]Ahmed Badr, Ashish Khisti, Emin Martinian:
Diversity Embedded Streaming Erasure Codes (DE-SCo): Constructions and Optimality. CoRR abs/1007.1735 (2010) - [i9]Ashish Khisti, Suhas N. Diggavi, Gregory W. Wornell:
Secret-key Agreement with Channel State Information at the Transmitter. CoRR abs/1009.3052 (2010)
2000 – 2009
- 2009
- [b1]Ashish Khisti:
Algorithms and architecture for multiusers, multi-terminal, multi-layer information theoretic security. Massachusetts Institute of Technology, Cambridge, MA, USA, 2009 - [c13]Ashish Khisti, Gregory W. Wornell, Suhas N. Diggavi:
Secret key agreement using asymmetry in channel state knowledge. ISIT 2009: 2286-2290 - [c12]Jatinder P. Singh, Ashish Khisti:
On multicasting with streaming burst-erasure codes. ISIT 2009: 2887-2891 - [i8]Tal Philosof, Ram Zamir, Uri Erez, Ashish Khisti:
Lattice Strategies for the Dirty Multiple Access Channel. CoRR abs/0904.1892 (2009) - [i7]Ashish Khisti, Suhas N. Diggavi, Gregory W. Wornell:
Secret-Key Generation using Correlated Sources and Channels. CoRR abs/0906.1835 (2009) - 2008
- [j5]Ashish Khisti, Aslan Tchamkerten, Gregory W. Wornell:
Secure Broadcasting Over Fading Channels. IEEE Trans. Inf. Theory 54(6): 2453-2469 (2008) - [j4]Aggelos Bletsas, Ashish Khisti, Moe Z. Win:
Opportunistic cooperative diversity with feedback and cheap radios. IEEE Trans. Wirel. Commun. 7(5-2): 1823-1827 (2008) - [c11]Ashish Khisti, Suhas N. Diggavi, Gregory W. Wornell:
Secret-key generation with correlated sources and noisy channels. ISIT 2008: 1005-1009 - 2007
- [j3]Ashish Khisti, Uri Erez, Amos Lapidoth, Gregory W. Wornell:
Carbon Copying Onto Dirty Paper. IEEE Trans. Inf. Theory 53(5): 1814-1827 (2007) - [c10]Stark C. Draper, Ashish Khisti, Emin Martinian, Anthony Vetro, Jonathan S. Yedidia:
Using Distributed Source Coding to Secure Fingerprint Biometrics. ICASSP (2) 2007: 129-132 - [c9]Tal Philosof, Ashish Khisti, Uri Erez, Ram Zamir:
Lattice Strategies for the Dirty Multiple Access Channel. ISIT 2007: 386-390 - [c8]Ashish Khisti, Gregory W. Wornell, Ami Wiesel, Yonina C. Eldar:
On the Gaussian MIMO Wiretap Channel. ISIT 2007: 2471-2475 - [i6]Ashish Khisti, Gregory W. Wornell:
Secure Transmission with Multiple Antennas: The MISOME Wiretap Channel. CoRR abs/0708.4219 (2007) - [i5]Ashish Khisti, Gregory W. Wornell:
The MIMOME Channel. CoRR abs/0710.1325 (2007) - [i4]Ashish Khisti, Aslan Tchamkerten, Gregory W. Wornell:
Secure Broadcasting. CoRR abs/cs/0702093 (2007) - 2006
- [j2]Aggelos Bletsas, Ashish Khisti, David P. Reed, Andrew Lippman:
A simple Cooperative diversity method based on network path selection. IEEE J. Sel. Areas Commun. 24(3): 659-672 (2006) - [j1]Ashish Khisti, Uri Erez, Gregory W. Wornell:
Fundamental limits and scaling behavior of cooperative multicasting in wireless networks. IEEE Trans. Inf. Theory 52(6): 2762-2770 (2006) - [c7]Ashish Khisti, Emin Martinian, Gregory W. Wornell:
Information Embedding with Distortion Side Information. ISIT 2006: 183-187 - [c6]Aslan Tchamkerten, Ashish Khisti, Gregory W. Wornell:
Information Theoretic Perspectives on Synchronization. ISIT 2006: 371-375 - [c5]Aggelos Bletsas, Ashish Khisti, Moe Z. Win:
Low complexity virtual antenna arrays using cooperative relay selection. IWCMC 2006: 461-466 - [c4]Emin Martinian, Anthony Vetro, Jonathan S. Yedidia, João Ascenso, Ashish Khisti, Dmitry Malioutov:
Hybrid Distributed Video Coding Using SCA Codes. MMSP 2006: 258-261 - 2005
- [i3]Aggelos Bletsas, Ashish Khisti, David P. Reed, Andrew Lippman:
A Simple Cooperative Diversity Method Based on Network Path Selection. CoRR abs/cs/0510071 (2005) - [i2]Ashish Khisti, Uri Erez, Amos Lapidoth, Gregory W. Wornell:
Carbon Copying Onto Dirty Paper. CoRR abs/cs/0511095 (2005) - [i1]Ashish Khisti, Uri Erez, Gregory W. Wornell:
Fundamental Limits and Scaling Behavior of Cooperative Multicasting in Wireless Networks. CoRR abs/cs/0512087 (2005) - 2004
- [c3]Ashish Khisti, Mitchell D. Trott:
On the coding-spreading tradeoff and intra-cell frequency planning in uplink CDMA systems. GLOBECOM 2004: 252-256 - [c2]Ashish Khisti, Uri Erez, Gregory W. Wornell:
Writing on many pieces of dirty paper at once: the binary case. ISIT 2004: 535 - [c1]Johnny Chen, Ashish Khisti, Dmitry Malioutov, Jonathan S. Yedidia:
Distributed source coding using serially-concatenated-accumulate codes. ITW 2004: 209-214
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 19:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint