Search Results - "Goeckel, Dennis L."
-
1
Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting
Published in IEEE transactions on wireless communications (01-06-2011)“…In this letter, we study the opportunistic use of relays for secret communications, and propose two transmission schemes that do not require the knowledge of…”
Get full text
Journal Article -
2
Convergence of the Complex Envelope of Bandlimited OFDM Signals
Published in IEEE transactions on information theory (01-10-2010)“…Orthogonal frequency division multiplexing (OFDM) systems have been used extensively in wireless communications in recent years; thus, there is significant…”
Get full text
Journal Article -
3
Matching Anonymized and Obfuscated Time Series to Users' Profiles
Published in IEEE transactions on information theory (01-02-2019)“…Many popular applications use traces of user data to offer various services to their users. However, even if user data are anonymized and obfuscated, a user's…”
Get full text
Journal Article -
4
Identification of Wireless Devices of Users Who Actively Fake Their RF Fingerprints With Artificial Data Distortion
Published in IEEE transactions on wireless communications (01-11-2015)“…Variations in the RF chain of radio transmitters caused by imperfections of manufacturing processes can be used as a signature to uniquely associate wireless…”
Get full text
Journal Article -
5
Privacy of Dependent Users Against Statistical Matching
Published in IEEE transactions on information theory (01-09-2020)“…Modern applications significantly enhance user experience by adapting to each user's individual condition and/or preferences. While this adaptation can greatly…”
Get full text
Journal Article -
6
Wireless Device Identification Based on RF Oscillator Imperfections
Published in IEEE transactions on information forensics and security (01-12-2015)“…The exploitation of slight imperfections of transmitters' hardware for identification of wireless devices has recently emerged as an effective method for…”
Get full text
Journal Article -
7
Asymptotic Privacy Loss Due to Time Series Matching of Dependent Users
Published in IEEE communications letters (01-04-2021)“…The Internet of Things (IoT) promises to improve user utility by tuning applications to a user's current behavior, but the user's behavior can be matched to…”
Get full text
Journal Article -
8
Analog Cancellation of a Known Remote Interference: Hardware Realization and Analysis
Published in IEEE wireless communications letters (01-03-2024)“…The onset of quantum computing calls for secrecy schemes that can provide everlasting secrecy resistant to increased computational power of an adversary. One…”
Get full text
Journal Article -
9
On the study of network coding with diversity
Published in IEEE transactions on wireless communications (01-03-2009)“…Recently proposed physical-layer network coding (PNC) has demonstrated the promise to significantly improve the throughput of wireless networks whose links can…”
Get full text
Journal Article -
10
Leveraging Prior Knowledge Asymmetries in the Design of Location Privacy-Preserving Mechanisms
Published in IEEE wireless communications letters (01-11-2020)“…The prevalence of mobile devices and Location-Based Services (LBS) necessitates the study of Location Privacy-Preserving Mechanisms (LPPM). However, LPPMs…”
Get full text
Journal Article -
11
Achievable Information-Theoretic Secrecy in the Presence of a Radar
Published in MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) (01-11-2019)“…As the demand for spectrum increases, co-existence between radar and communication systems has been of increased interest. However, the effect of a radar…”
Get full text
Conference Proceeding -
12
Asynchronous cooperative diversity
Published in IEEE transactions on wireless communications (01-06-2006)“…Cooperative diversity, which employs multiple nodes for the simultaneous relaying of a given packet in wireless ad hoc networks, has been shown to be an…”
Get full text
Journal Article -
13
Asymptotic Loss in Privacy due to Dependency in Gaussian Traces
Published in 2019 IEEE Wireless Communications and Networking Conference (WCNC) (01-04-2019)“…The rapid growth of the Internet of Things (IoT) necessitates employing privacy-preserving techniques to protect users' sensitive information. Even when user…”
Get full text
Conference Proceeding -
14
Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks
Published in IEEE transactions on wireless communications (01-09-2012)“…Energy efficient secure communication in wireless networks in the presence of eavesdroppers is considered. For a secure transmission to the destination, a set…”
Get full text
Journal Article -
15
On the Study of Analogue Network Coding for Multi-Pair, Bidirectional Relay Channels
Published in IEEE transactions on wireless communications (01-02-2011)“…We consider a scenario where multiple pairs of users exchange information within pair, with the help of a dedicated multi-antenna relay. The protocol…”
Get full text
Journal Article -
16
Slightly Frequency-Shifted Reference Ultra-Wideband (UWB) Radio
Published in IEEE transactions on communications (01-03-2007)“…A promising ultra-wideband (UWB) radio technique being widely considered for low-data-rate applications, such as those often encountered in sensor networks, is…”
Get full text
Journal Article -
17
Adaptive coding for time-varying channels using outdated fading estimates
Published in IEEE transactions on communications (01-06-1999)“…The idea of using knowledge of the current channel fading values to optimize the transmitted signal in wireless communication systems has attracted substantial…”
Get full text
Journal Article -
18
A Relay Assisted Cooperative Transmission Protocol for Wireless Multiple Access Systems
Published in IEEE transactions on communications (01-08-2010)“…In this paper, we propose a spectrally efficient cooperative transmission protocol for multiple access scenarios. The key feature is to utilize multi-user…”
Get full text
Journal Article -
19
On the Performance of General Cache Networks
Published in EAI endorsed transactions on cloud systems (01-11-2015)“…The performance evaluation of cache networks has gain a huge attention due to content-oriented delivery technologies. If general network topologies are more…”
Get full text
Journal Article -
20
Cooperative Transmission Protocols for Wireless Broadcast Channels
Published in IEEE transactions on wireless communications (01-12-2010)“…In this paper, cooperative transmission protocols are proposed for wireless broadcast channels, a fundamental building block of wireless communication…”
Get full text
Journal Article