Year |
Citation |
Score |
2020 |
Zhang Q, Bakshi M, Jaggi S. Covert Communication With Polynomial Computational Complexity Ieee Transactions On Information Theory. 66: 1354-1384. DOI: 10.1109/Tit.2019.2955987 |
0.615 |
|
2020 |
Song J, Zhang Q, Kadhe S, Bakshi M, Jaggi S. Stealthy Communication over Adversarially Jammed Multipath Networks Ieee Transactions On Communications. 1-1. DOI: 10.1109/Tcomm.2020.3022785 |
0.593 |
|
2018 |
Wang Q, Jaggi S. End-to-End Error-Correcting Codes on Networks With Worst-Case Bit Errors Ieee Transactions On Information Theory. 64: 4467-4479. DOI: 10.1109/Tit.2018.2817801 |
0.514 |
|
2017 |
Wang Q, Jaggi S, Medard M, Cadambe VR, Schwartz M. File Updates Under Random/Arbitrary Insertions and Deletions Ieee Transactions On Information Theory. 63: 6487-6513. DOI: 10.1109/Tit.2017.2705100 |
0.4 |
|
2017 |
Cai S, Jahangoshahi M, Bakshi M, Jaggi S. Efficient Algorithms for Noisy Group Testing Ieee Transactions On Information Theory. 63: 2113-2136. DOI: 10.1109/Tit.2017.2659619 |
0.557 |
|
2016 |
Bakshi M, Jaggi S, Cai S, Chen M. SHO-FA: Robust Compressive Sensing With Order-Optimal Complexity, Measurements, and Bits Ieee Transactions On Information Theory. 62: 7419-7444. DOI: 10.1109/Tit.2015.2466601 |
0.552 |
|
2016 |
Zhang Q, Bakshi M, Jaggi S. Computationally efficient deniable communication Ieee International Symposium On Information Theory - Proceedings. 2016: 2234-2238. DOI: 10.1109/ISIT.2016.7541696 |
0.62 |
|
2016 |
Kadhe S, Sprintson A, Zhang QE, Bakshi M, Jaggi S. Reliable and secure communication over adversarial multipath networks: A survey 2015 10th International Conference On Information, Communications and Signal Processing, Icics 2015. DOI: 10.1109/ICICS.2015.7459910 |
0.605 |
|
2015 |
Zhang QE, Kadhe S, Bakshi M, Jaggi S, Sprintson A. Talking reliably, secretly, and efficiently: A "complete" characterization 2015 Ieee Information Theory Workshop, Itw 2015. DOI: 10.1109/ITW.2015.7133143 |
0.46 |
|
2015 |
Zhang Q, Kadhe S, Bakshi M, Jaggi S, Sprintson A. Coding against a limited-view adversary: The effect of causality and feedback Ieee International Symposium On Information Theory - Proceedings. 2015: 2530-2534. DOI: 10.1109/ISIT.2015.7282912 |
0.599 |
|
2014 |
Che PH, Bakshi M, Chan C, Jaggi S. Reliable deniable communication with channel uncertainty 2014 Ieee Information Theory Workshop, Itw 2014. 30-34. DOI: 10.1109/ITW.2014.6970786 |
0.544 |
|
2014 |
Che PH, Bakshi M, Chan C, Jaggi S. Reliable, deniable and hidable communication 2014 Information Theory and Applications Workshop, Ita 2014 - Conference Proceedings. DOI: 10.1109/ITA.2014.6804271 |
0.498 |
|
2014 |
Kadhe S, Jaggi S, Bakshi M, Sprintson A. Reliable, deniable, and hidable communication over multipath networks Ieee International Symposium On Information Theory - Proceedings. 611-615. DOI: 10.1109/ISIT.2014.6874905 |
0.582 |
|
2014 |
Cai S, Bakshi M, Jaggi S, Chen M. FRANTIC: A Fast Reference-based Algorithm for Network Tomography via compressive sensing 2014 6th International Conference On Communication Systems and Networks, Comsnets 2014. DOI: 10.1109/COMSNETS.2014.6734865 |
0.573 |
|
2013 |
Dey BK, Jaggi S, Langberg M, Sarwate AD. Upper bounds on the capacity of binary channels with causal adversaries Ieee Transactions On Information Theory. 59: 3753-3763. DOI: 10.1109/Tit.2013.2245721 |
0.408 |
|
2013 |
Dey BK, Jaggi S, Langberg M. Codes against online adversaries: Large alphabets Ieee Transactions On Information Theory. 59: 3304-3316. DOI: 10.1109/Tit.2013.2245717 |
0.425 |
|
2013 |
Mohsenian-Rad H, Huang J, Wong VWS, Jaggi S, Schober R. Inter-Session Network Coding with Strategic Users: A Game-Theoretic Analysis of the Butterfly Network Ieee Transactions On Communications. 61: 1473-1484. DOI: 10.1109/Tcomm.2013.021413.110555 |
0.457 |
|
2013 |
Che PH, Chen M, Ho T, Jaggi S, Langberg M. Routing for security in networks with adversarial nodes 2013 International Symposium On Network Coding, Netcod 2013. DOI: 10.1109/NetCod.2013.6570834 |
0.347 |
|
2013 |
Chan CL, Cai S, Bakshi M, Jaggi S, Saligrama V. Stochastic threshold group testing 2013 Ieee Information Theory Workshop, Itw 2013. DOI: 10.1109/ITW.2013.6691242 |
0.487 |
|
2013 |
Che PH, Bakshi M, Jaggi S. Reliable deniable communication: Hiding messages in noise Ieee International Symposium On Information Theory - Proceedings. 2945-2949. DOI: 10.1109/ISIT.2013.6620765 |
0.573 |
|
2013 |
Huang W, Ho T, Yao H, Jaggi S. Rateless resilient network coding against byzantine adversaries Proceedings - Ieee Infocom. 265-269. DOI: 10.1109/INFCOM.2013.6566776 |
0.433 |
|
2013 |
Cai S, Jahangoshahi M, Bakshi M, Jaggi S. GROTESQUE: Noisy group testing (Quick and Efficient) 2013 51st Annual Allerton Conference On Communication, Control, and Computing, Allerton 2013. 1234-1241. DOI: 10.1109/Allerton.2013.6736667 |
0.52 |
|
2012 |
Chan CL, Jaggi S, Saligrama V, Agnihotri S. Non-adaptive group testing: Explicit bounds and novel algorithms Ieee International Symposium On Information Theory - Proceedings. 1837-1841. DOI: 10.1109/Tit.2014.2310477 |
0.362 |
|
2012 |
Yao H, Jaggi S, Chen M. Passive network tomography for erroneous networks: A network coding approach Ieee Transactions On Information Theory. 58: 5922-5940. DOI: 10.1109/Tit.2012.2204532 |
0.489 |
|
2012 |
Agnihotri S, Jaggi S, Chen M. Analog network coding in general SNR regime: Performance of network simplification 2012 Ieee Information Theory Workshop, Itw 2012. 632-636. DOI: 10.1109/ITW.2012.6404754 |
0.351 |
|
2012 |
Agnihotri S, Jaggi S, Chen M. Analog network coding in general SNR regime Ieee International Symposium On Information Theory - Proceedings. 2052-2056. DOI: 10.1109/ISIT.2012.6283722 |
0.372 |
|
2012 |
Jaggi S, Langberg M. Secure Network Coding. Bounds and Algorithms for Secret and Reliable Communications Network Coding. 183-215. DOI: 10.1016/B978-0-12-380918-6.00007-X |
0.477 |
|
2012 |
Agnihotri S, Jaggi S, Chen M. Analog network coding in general snr regime: Performance of a greedy scheme 2012 International Symposium On Network Coding, Netcod 2012. 137-142. |
0.36 |
|
2011 |
Gohari AA, Yang S, Jaggi S. Beyond the cut-set bound: Uncertainty computations in network coding with correlated sources Ieee International Symposium On Information Theory - Proceedings. 598-602. DOI: 10.1109/Tit.2013.2262454 |
0.445 |
|
2011 |
Dikaliotis TK, Ho T, Jaggi S, Vyetrenko S, Yao H, Effros M, Kliewer J, Erez E. Multiple-Access Network Information-Flow and Correction Codes Ieee Transactions On Information Theory. 57: 1067-1079. DOI: 10.1109/Tit.2010.2095130 |
0.697 |
|
2011 |
Wang Q, Jaggi S, Li SYR. Binary error correcting network codes 2011 Ieee Information Theory Workshop, Itw 2011. 498-502. DOI: 10.1109/ITW.2011.6089511 |
0.394 |
|
2011 |
Agnihotri S, Jaggi S, Chen M. Amplify-and-forward in wireless relay networks 2011 Ieee Information Theory Workshop, Itw 2011. 311-315. DOI: 10.1109/ITW.2011.6089444 |
0.352 |
|
2010 |
Yao H, Silva D, Jaggi S, Langberg M. Network codes resilient to jamming and eavesdropping 2010 Ieee International Symposium On Network Coding, Netcod 2010. 31-36. DOI: 10.1109/Tnet.2013.2294254 |
0.535 |
|
2010 |
Bakshi M, Jaggi S, Effros M. Concatenated polar codes Ieee International Symposium On Information Theory - Proceedings. 918-922. DOI: 10.1109/ISIT.2010.5513508 |
0.651 |
|
2010 |
Yao H, Jaggi S, Chen M. Network coding tomography for network failures Proceedings - Ieee Infocom. DOI: 10.1109/INFCOM.2010.5462265 |
0.363 |
|
2010 |
Li Y, Yao H, Chen M, Jaggi S, Rosen A. RIPPLE authentication for network coding Proceedings - Ieee Infocom. DOI: 10.1109/INFCOM.2010.5462051 |
0.413 |
|
2010 |
Yao H, Jaggi S, Chen M, Ho T. Network RS codes for efficient network adversary localization Conference Record - Asilomar Conference On Signals, Systems and Computers. 724-728. DOI: 10.1109/ACSSC.2010.5757658 |
0.36 |
|
2008 |
Jaggi S, Langberg M, Katti S, Ho T, Katabi D, Medard M, Effros M. Resilient Network Coding in the Presence of Byzantine Adversaries Ieee Transactions On Information Theory. 54: 2596-2603. DOI: 10.1109/Tit.2008.921711 |
0.688 |
|
2008 |
Sharma G, Jaggi S, Dey BK. Network tomography via network coding 2008 Information Theory and Applications Workshop - Conference Proceedings, Ita. 151-157. DOI: 10.1109/ITA.2008.4601041 |
0.339 |
|
2008 |
Ephremides A, Jaggi S, Ho T, Shrader B, Chung SY. Network coding Journal of Communications and Networks. 10: 367-370. |
0.377 |
|
2007 |
Jaggi S, Langberg M. Resilient network codes in the presence of eavesdropping Byzantine adversaries Ieee International Symposium On Information Theory - Proceedings. 541-545. DOI: 10.1109/ISIT.2007.4557281 |
0.422 |
|
2006 |
Jaggi S, Suto YC, Effros M. Low complexity encoding for network codes Ieee International Symposium On Information Theory - Proceedings. 40-44. DOI: 10.1109/ISIT.2006.261594 |
0.676 |
|
2005 |
Jaggi S, Sanders P, Chou P, Effros M, Egner S, Jain K, Tolhuizen L. Polynomial Time Algorithms for Multicast Network Code Construction Ieee Transactions On Information Theory. 51: 1973-1982. DOI: 10.1109/Tit.2005.847712 |
0.682 |
|
2003 |
Jaggi S, Chou PA, Jain K. Low complexity algebraic multicast network codes Ieee International Symposium On Information Theory - Proceedings. 368. |
0.416 |
|
2002 |
Jaggi S, Effros M. Universal linked multiple access source codes Ieee International Symposium On Information Theory - Proceedings. 95. |
0.351 |
|
Show low-probability matches. |