Sciweavers

PIMRC
2010
IEEE
13 years 1 months ago
Transmission of common, public and confidential messages in broadcast channels with multiple antennas
Abstract-- We study the Gaussian multiple-input multipleoutput (MIMO) wiretap channel, which consists of a transmitter, a legitimate user, and an eavesdropper. In this channel, the...
Ersen Ekrem, Sennur Ulukus
CORR
2010
Springer
142views Education» more  CORR 2010»
13 years 3 months ago
Capacity-Equivocation Region of the Gaussian MIMO Wiretap Channel
We study the Gaussian multiple-input multiple-output (MIMO) wiretap channel, which consists of a transmitter, a legitimate user, and an eavesdropper. In this channel, the transmit...
Ersen Ekrem, Sennur Ulukus
AAAI
2008
13 years 6 months ago
Proactive Intrusion Detection
Machine learning systems are deployed in many adversarial conditions like intrusion detection, where a classifier has to decide whether a sequence of actions come from a legitimat...
Benjamin Liebald, Dan Roth, Neelay Shah, Vivek Sri...
ACSAC
2003
IEEE
13 years 9 months ago
Intrusion Detection: A Bioinformatics Approach
This paper addresses the problem of detecting masquerading, a security attack in which an intruder assumes the identity of a legitimate user. Many approaches based on Hidden Marko...
Scott E. Coull, Joel W. Branch, Boleslaw K. Szyman...
INFOCOM
2007
IEEE
13 years 10 months ago
Malicious Users in Unstructured Networks
—Unstructured networks (like ad-hoc or peer-to-peer networks) are networks without centralized control of their operation. Users make local decisions regarding whether to follow ...
George Theodorakopoulos, John S. Baras