Sciweavers

PIMRC
2010
IEEE
13 years 10 months ago
Transmission of common, public and confidential messages in broadcast channels with multiple antennas
Abstract-- We study the Gaussian multiple-input multipleoutput (MIMO) wiretap channel, which consists of a transmitter, a legitimate user, and an eavesdropper. In this channel, the...
Ersen Ekrem, Sennur Ulukus
CORR
2010
Springer
142views Education» more  CORR 2010»
14 years 17 days ago
Capacity-Equivocation Region of the Gaussian MIMO Wiretap Channel
We study the Gaussian multiple-input multiple-output (MIMO) wiretap channel, which consists of a transmitter, a legitimate user, and an eavesdropper. In this channel, the transmit...
Ersen Ekrem, Sennur Ulukus
AAAI
2008
14 years 2 months ago
Proactive Intrusion Detection
Machine learning systems are deployed in many adversarial conditions like intrusion detection, where a classifier has to decide whether a sequence of actions come from a legitimat...
Benjamin Liebald, Dan Roth, Neelay Shah, Vivek Sri...
ACSAC
2003
IEEE
14 years 5 months ago
Intrusion Detection: A Bioinformatics Approach
This paper addresses the problem of detecting masquerading, a security attack in which an intruder assumes the identity of a legitimate user. Many approaches based on Hidden Marko...
Scott E. Coull, Joel W. Branch, Boleslaw K. Szyman...
INFOCOM
2007
IEEE
14 years 6 months ago
Malicious Users in Unstructured Networks
—Unstructured networks (like ad-hoc or peer-to-peer networks) are networks without centralized control of their operation. Users make local decisions regarding whether to follow ...
George Theodorakopoulos, John S. Baras