暂无分享,去创建一个
[1] D. Blackwell,et al. The Capacities of Certain Channel Classes Under Random Coding , 1960 .
[2] Ankur A. Kulkarni,et al. Shannon Meets von Neumann: A Minimax Theorem for Channel Coding in the Presence of a Jammer , 2018, IEEE Transactions on Information Theory.
[3] Ankur A. Kulkarni,et al. On a Game Between a Delay-Constrained Communication System and a Finite State Jammer , 2018, 2018 IEEE Conference on Decision and Control (CDC).
[4] Prakash Narayan,et al. Reliable Communication Under Channel Uncertainty , 1998, IEEE Trans. Inf. Theory.
[5] R. Ahlswede. A Note on the Existence of the Weak Capacity for Channels with Arbitrarily Varying Channel Probability Functions and Its Relation to Shannon's Zero Error Capacity , 1970 .
[6] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[7] Prakash Narayan,et al. Gaussian arbitrarily varying channels , 1987, IEEE Trans. Inf. Theory.
[8] Tamer Basar,et al. A complete characterization of minimax and maximin encoder- decoder policies for communication channels with incomplete statistical description , 1985, IEEE Trans. Inf. Theory.
[9] Ankur A. Kulkarni,et al. Linear Programming-Based Converses for Finite Blocklength Lossy Joint Source-Channel Coding , 2016, IEEE Transactions on Information Theory.
[10] Anuj Vora,et al. A Minimax Theorem for Finite Blocklength Joint Source-Channel Coding over an AVC , 2019, 2019 National Conference on Communications (NCC).
[11] H. Vincent Poor,et al. Channel Coding Rate in the Finite Blocklength Regime , 2010, IEEE Transactions on Information Theory.
[12] Sergio Verdú,et al. Lossy Joint Source-Channel Coding in the Finite Blocklength Regime , 2012, IEEE Transactions on Information Theory.
[13] R. Ahlswede. Elimination of correlation in random codes for arbitrarily varying channels , 1978 .
[14] R. McEliece,et al. Some Information Theoretic Saddlepoints , 1985 .
[15] Fengjun Li,et al. Cyber-Physical Systems Security—A Survey , 2017, IEEE Internet of Things Journal.
[16] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[17] Jill Slay,et al. Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.
[18] Jörg Kliewer,et al. Dispersion of the discrete arbitrarily-varying channel with limited shared randomness , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).
[19] Imre Csiszár,et al. Information Theory - Coding Theorems for Discrete Memoryless Systems, Second Edition , 2011 .
[20] Ankur A. Kulkarni,et al. Improved Finite Blocklength Converses for Slepian–Wolf Coding via Linear Programming , 2018, IEEE Transactions on Information Theory.
[21] Todd P. Coleman,et al. An Optimizer's Approach to Stochastic Control Problems With Nonclassical Information Structures , 2013, IEEE Transactions on Automatic Control.
[22] Sergio Verdú,et al. Fixed-Length Lossy Compression in the Finite Blocklength Regime , 2011, IEEE Transactions on Information Theory.
[23] Jörg Kliewer,et al. Finite Blocklength and Dispersion Bounds for the Arbitrarily- Varying Channel , 2018, 2018 IEEE International Symposium on Information Theory (ISIT).
[24] Wayne E. Stark,et al. On the capacity of channels with unknown interference , 1989, IEEE Trans. Inf. Theory.
[25] Aaron D. Wyner,et al. Coding Theorems for a Discrete Source With a Fidelity CriterionInstitute of Radio Engineers, International Convention Record, vol. 7, 1959. , 1993 .
[26] Gérard Cornuéjols,et al. Integer programming , 2014, Math. Program..