Eric Graves
Eric Graves
Verified email at mail.mil
Title
Cited by
Cited by
Year
Radar remote monitoring of vital signs
C Li, J Cummings, J Lam, E Graves, W Wu
Microwave Magazine, IEEE 10 (1), 47-56, 2009
2142009
Detection of channel degradation attack by Intermediary Node in Linear Networks
E Graves, TF Wong
INFOCOM, 2012 Proceedings IEEE, 747-755, 2012
112012
A coding approach to guarantee information integrity against a Byzantine relay
E Graves, TF Wong
2013 IEEE International Symposium on Information Theory, 2780-2784, 2013
102013
Inner bound for the capacity region of noisy channels with an authentication requirement
J Perazzone, E Graves, P Yu, R Blum
2018 IEEE International Symposium on Information Theory (ISIT), 126-130, 2018
92018
Detecting substitution attacks against non-colluding relays
R Cao, E Graves, TF Wong, T Lv
Global Communications Conference (GLOBECOM), 2013 IEEE, 1856-1861, 2013
92013
Detectability of Symbol Manipulation by an Amplify-and-Forward Relay
E Graves, T Wong
arXiv preprint arXiv:1205.2681, 2012
92012
Keyless authentication in the presence of a simultaneously transmitting adversary
E Graves, P Yu, P Spasojevic
2016 IEEE Information Theory Workshop (ITW), 201-205, 2016
72016
Equal-image-size source partitioning: Creating strong Fano's inequalities for multi-terminal discrete memoryless channels
E Graves, TF Wong
arXiv preprint arXiv:1512.00824, 2015
62015
Wiretap channel capacity: Secrecy criteria, strong converse, and phase change
E Graves, TF Wong
arXiv preprint arXiv:1701.07347, 2017
42017
Equating the achievable exponent region to the achievable entropy region by partitioning the source
E Graves, TF Wong
2014 IEEE International Symposium on Information Theory, 1346-1350, 2014
42014
Secret sharing in fast fading channels using obfuscated incremental-redundancy hybrid ARQ
CW Wong, E Graves, JM Shea, TF Wong
Military Communications Conference, 2009. MILCOM 2009. IEEE, 1-7, 2009
42009
Authentication Against a Myopic Adversary
A Beemer, O Kosut, J Kliewer, E Graves, P Yu
2019 IEEE Conference on Communications and Network Security (CNS), 1-5, 2019
32019
Information stabilization of images over discrete memoryless channels
E Graves, TF Wong
2016 IEEE International Symposium on Information Theory (ISIT), 2619-2623, 2016
32016
Inducing information stability to obtain information theoretic necessary requirements
E Graves, TF Wong
IEEE Transactions on Information Theory, 2019
22019
Structured Coding for Authentication in the Presence of a Malicious Adversary
A Beemer, O Kosut, J Kliewer, E Graves, P Yu
2019 IEEE International Symposium on Information Theory (ISIT), 617-621, 2019
22019
Information integrity between correlated sources through Wyner-Ziv coding
E Graves, TF Wong
2015 IEEE Information Theory Workshop-Fall (ITW), 332-336, 2015
22015
Information integrity in lossy source coding with side information
E Graves, TF Wong
2014 52nd Annual Allerton Conference on Communication, Control, and …, 2014
22014
Secret key authentication capacity region, Part II: typical authentication rate
E Graves, J Perazzone, P Yu, R Blum
arXiv preprint arXiv:2001.01667, 2020
12020
An information theoretic model for summarization, and some basic results
E Graves, Q Ning, P Basu
2019 IEEE International Symposium on Information Theory (ISIT), 502-506, 2019
12019
Modular design to transform codes for the wiretap channel of type I into codes for the wiretap channel of type II
E Graves, A Beemer
arXiv preprint arXiv:1901.06377, 2019
12019
The system can't perform the operation now. Try again later.
Articles 1–20