default search action
Eric Graves 0001
Person information
- affiliation: US Army Research Laboratory, Adelphi, MD, USA
- affiliation (PhD 2013): University of Florida, Gainesville, FL, USA
Other persons with the same name
- Eric Graves 0002 — University of Alberta, Department of Computing Science, Canada
- Eric Graves 0003 — Hayes Performance Systems, Mequon, WI, USA
- Eric Graves 0004 — Indiana University Indianapolis, Indianapolis, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c26]Eric Graves, Jake B. Perazzone, Kevin S. Chan:
Optimal Update Policy for the Monitoring of Distributed Sources. ISIT 2024: 1385-1390 - [i15]Eric Graves, Jake B. Perazzone, Kevin S. Chan:
Optimal Update Policy for the Monitoring of Distributed Sources. CoRR abs/2405.11089 (2024) - 2023
- [j5]Eric Graves, Allison Beemer, Jörg Kliewer, Oliver Kosut, Paul L. Yu:
Keyless Authentication for AWGN Channels. IEEE Trans. Inf. Theory 69(1): 496-519 (2023) - [j4]Yirong Cheng, Eric Graves, Ananthram Swami, Ashutosh Sabharwal:
Estimating Traffic Rates in CSMA/CA Networks: A Feasibility Analysis for a Class of Eavesdroppers. IEEE Trans. Wirel. Commun. 22(12): 9793-9807 (2023) - [c25]C. Nicolas Barati, Bishal Lamichhane, Siyu Liao, Eric Graves, Ananthram Swami, Ashutosh Sabharwal:
Unsupervised Wireless Diarization: A Potential New Attack on Encrypted Wireless Networks. ICC 2023: 2312-2318 - 2022
- [j3]Jake B. Perazzone, Eric Graves, Paul L. Yu, Rick S. Blum:
Secret Key-Enabled Authenticated-Capacity Region, Part I: Average Authentication. IEEE Trans. Inf. Theory 68(10): 6802-6825 (2022) - [j2]Eric Graves, Jake B. Perazzone, Paul L. Yu, Rick S. Blum:
Secret Key-Enabled Authenticated-Capacity Region, Part - II: Typical-Authentication. IEEE Trans. Inf. Theory 68(11): 6981-7004 (2022) - [c24]John Corcoran, Eric Graves, Bryan Dawson, Matthew Dwyer, Paul L. Yu, Kevin Chan:
Adaptive Monitoring for Analytics Placement in Tactical Networks. MILCOM 2022: 926-931 - 2021
- [c23]Yirong Cheng, Eric Graves, Ananthram Swami, Ashutosh Sabharwal:
Estimating Link Packet Rates From Partial CSMA/CA Network Observations. ACSCC 2021: 772-779 - [c22]Nishant Mehrotra, Eric Graves, Ananthram Swami, Ashutosh Sabharwal:
Minimax Bounds for Blind Network Inference. ISIT 2021: 1823-1828 - [i14]Eric Graves, Allison Beemer, Jörg Kliewer, Oliver Kosut, Paul L. Yu:
Keyless Authentication for AWGN Channels. CoRR abs/2111.06386 (2021) - 2020
- [j1]Eric Graves, Tan F. Wong:
Inducing Information Stability to Obtain Information Theoretic Necessary Requirements. IEEE Trans. Inf. Theory 66(2): 835-864 (2020) - [c21]Allison Beemer, Eric Graves, Jörg Kliewer, Oliver Kosut, Paul L. Yu:
Authentication and Partial Message Correction over Adversarial Multiple-Access Channels. CNS 2020: 1-6 - [c20]Allison Beemer, Eric Graves, Jörg Kliewer, Oliver Kosut, Paul L. Yu:
Authentication with Mildly Myopic Adversaries. ISIT 2020: 984-989 - [i13]Eric Graves, Jake B. Perazzone, Paul L. Yu, Rick S. Blum:
Secret key authentication capacity region, Part II: typical authentication rate. CoRR abs/2001.01667 (2020) - [i12]Jake B. Perazzone, Eric Graves, Paul L. Yu, Rick S. Blum:
Secret key authentication capacity region, Part I: average authentication rate. CoRR abs/2001.01668 (2020) - [i11]Allison Beemer, Eric Graves, Jörg Kliewer, Oliver Kosut, Paul L. Yu:
Authentication Against a Myopic Adversary. CoRR abs/2001.03593 (2020)
2010 – 2019
- 2019
- [c19]Allison Beemer, Oliver Kosut, Jörg Kliewer, Eric Graves, Paul L. Yu:
Authentication Against a Myopic Adversary. CNS 2019: 1-5 - [c18]Eric Graves, Qiang Ning, Prithwish Basu:
An information theoretic model for summarization, and some basic results. ISIT 2019: 502-506 - [c17]Allison Beemer, Oliver Kosut, Jörg Kliewer, Eric Graves, Paul L. Yu:
Structured Coding for Authentication in the Presence of a Malicious Adversary. ISIT 2019: 617-621 - [c16]Eric Graves, Allison Beemer:
Transforming an arbitrary code for the wiretap channel of type I into a code for the wiretap channel of type II. ITW 2019: 1-5 - [c15]Joshua Marker, John M. Shea, Tan F. Wong, Eric Graves, Paul L. Yu:
Identifying Bottleneck Nodes using Packet Delay Statistics. MILCOM 2019: 447-452 - [i10]Eric Graves, Qiang Ning, Prithwish Basu:
An information theoretic model for summarization, and some basic results. CoRR abs/1901.06376 (2019) - [i9]Eric Graves, Allison Beemer:
Modular design to transform codes for the wiretap channel of type I into codes for the wiretap channel of type II. CoRR abs/1901.06377 (2019) - 2018
- [c14]Jake B. Perazzone, Eric Graves, Paul L. Yu, Rick S. Blum:
Inner Bound for the Capacity Region of Noisy Channels with an Authentication Requirement. ISIT 2018: 126-130 - [c13]Eric Graves, Tan F. Wong:
Transmitting Arbitrary Sources with Finite Error Over a Broadcast Channel with Confidential Communications. ISIT 2018: 921-925 - [i8]Jake B. Perazzone, Eric Graves, Paul L. Yu, Rick S. Blum:
Inner Bound for the Capacity Region of Noisy Channels with an Authentication Requirement. CoRR abs/1801.03920 (2018) - [i7]Eric Graves, Tan F. Wong:
Inducing information stability and applications thereof to obtaining information theoretic necessary conditions directly from operational requirements. CoRR abs/1806.05589 (2018) - 2017
- [c12]Eric Graves:
Communications over a state dependent channel, when the channel state and message are dependent. Allerton 2017: 837-843 - [c11]Eric Graves, Brian Kirby, Paul L. Yu:
Messages per secret bit when authentication and a min-entropy secrecy criterion are required. CISS 2017: 1-6 - [c10]Eric Graves, Tan F. Wong:
Wiretap channel capacity: Secrecy criteria, strong converse, and phase change. ISIT 2017: 744-748 - [i6]Eric Graves, Tan F. Wong:
Wiretap channel capacity: Secrecy criteria, strong converse, and phase change. CoRR abs/1701.07347 (2017) - 2016
- [c9]Eric Graves, Tan F. Wong:
Information stabilization of images over discrete memoryless channels. ISIT 2016: 2619-2623 - [c8]Eric Graves, Paul L. Yu, Predrag Spasojevic:
Keyless authentication in the presence of a simultaneously transmitting adversary. ITW 2016: 201-205 - [i5]Eric Graves, Paul L. Yu, Predrag Spasojevic:
Keyless authentication in the presence of a simultaneously transmitting adversary. CoRR abs/1609.09454 (2016) - 2015
- [c7]Eric Graves, Tan F. Wong:
Information integrity between correlated sources through Wyner-Ziv coding. ITW Fall 2015: 332-336 - [i4]Eric Graves, Tan F. Wong:
Equal-image-size source partitioning: Creating strong Fano's inequalities for multi-terminal discrete memoryless channels. CoRR abs/1512.00824 (2015) - 2014
- [c6]Eric Graves, Tan F. Wong:
Information integrity in lossy source coding with side information. Allerton 2014: 1267-1271 - [c5]Eric Graves, Tan F. Wong:
Equating the achievable exponent region to the achievable entropy region by partitioning the source. ISIT 2014: 1346-1350 - [i3]Eric Graves, Tan F. Wong:
Equating the achievable exponent region to the achievable entropy region by partitioning the source. CoRR abs/1404.6585 (2014) - 2013
- [c4]Ruohan Cao, Eric Graves, Tan F. Wong, Tiejun Lv:
Detecting substitution attacks against non-colluding relays. GLOBECOM 2013: 1856-1861 - [c3]Eric Graves, Tan F. Wong:
A coding approach to guarantee information integrity against a Byzantine relay. ISIT 2013: 2780-2784 - [i2]Eric Graves, Tan F. Wong:
A coding approach to guarantee information integrity against a Byzantine relay. CoRR abs/1302.0059 (2013) - 2012
- [c2]Eric Graves, Tan F. Wong:
Detection of channel degradation attack by Intermediary Node in Linear Networks. INFOCOM 2012: 747-755 - [c1]Eric Graves, Ben Landers, David Greene, Tan F. Wong:
Certification codes for maliciousness detection in Physical-layer Network Coding. MILCOM 2012: 1-6 - [i1]Eric Graves, Tan F. Wong:
Detectability of Symbol Manipulation by an Amplify-and-Forward Relay. CoRR abs/1205.2681 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-12 22:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint