Sidharth Jaggi, Ph.D.
Affiliations: | 2005 | California Institute of Technology, Pasadena, CA |
Area:
Electronics and Electrical Engineering, Computer ScienceGoogle:
"Sidharth Jaggi"Parents
Sign in to add mentorMichelle Effros | grad student | 2005 | Caltech | |
(Design and analysis of network codes.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Zhang Q, Bakshi M, Jaggi S. (2020) Covert Communication With Polynomial Computational Complexity Ieee Transactions On Information Theory. 66: 1354-1384 |
Song J, Zhang Q, Kadhe S, et al. (2020) Stealthy Communication over Adversarially Jammed Multipath Networks Ieee Transactions On Communications. 1-1 |
Wang Q, Jaggi S. (2018) End-to-End Error-Correcting Codes on Networks With Worst-Case Bit Errors Ieee Transactions On Information Theory. 64: 4467-4479 |
Wang Q, Jaggi S, Medard M, et al. (2017) File Updates Under Random/Arbitrary Insertions and Deletions Ieee Transactions On Information Theory. 63: 6487-6513 |
Cai S, Jahangoshahi M, Bakshi M, et al. (2017) Efficient Algorithms for Noisy Group Testing Ieee Transactions On Information Theory. 63: 2113-2136 |
Bakshi M, Jaggi S, Cai S, et al. (2016) SHO-FA: Robust Compressive Sensing With Order-Optimal Complexity, Measurements, and Bits Ieee Transactions On Information Theory. 62: 7419-7444 |
Zhang Q, Bakshi M, Jaggi S. (2016) Computationally efficient deniable communication Ieee International Symposium On Information Theory - Proceedings. 2016: 2234-2238 |
Kadhe S, Sprintson A, Zhang QE, et al. (2016) Reliable and secure communication over adversarial multipath networks: A survey 2015 10th International Conference On Information, Communications and Signal Processing, Icics 2015 |
Zhang QE, Kadhe S, Bakshi M, et al. (2015) Talking reliably, secretly, and efficiently: A "complete" characterization 2015 Ieee Information Theory Workshop, Itw 2015 |
Zhang Q, Kadhe S, Bakshi M, et al. (2015) Coding against a limited-view adversary: The effect of causality and feedback Ieee International Symposium On Information Theory - Proceedings. 2015: 2530-2534 |