Rémi Chou

Assistant Professor in Computer Science in the CSE department at UTA.

Articles
  1. R. A. Chou, M. Bloch, and A. Yener, “Universal Covertness for Discrete Memoryless Sources,” IEEE Transactions on Information Theory, vol. 67, no. 8, pp. 1557–9654, Aug. 2021.
  2. R. A. Chou, M. R. Bloch, and J. Kliewer, “Empirical and Strong Coordination via Soft Covering with Polar Codes,” IEEE Transactions on Information Theory, vol. 64, no. 7, pp. 5087–5100, Jul. 2018.
  3. R. A. Chou, B. N. Vellambi, M. R. Bloch, and J. Kliewer, “Coding Schemes for Achieving Strong Secrecy at Negligible Cost,” IEEE Transactions on Information Theory, vol. 63, no. 3, pp. 1858–1873, Mar. 2017.
  4. R. A. Chou and M. R. Bloch, “Polar Coding for the Broadcast Channel with Confidential Messages: A Random Binning Analogy,” IEEE Transactions on Information Theory, vol. 62, no. 5, pp. 2410–2429, May 2016.
  5. R. A. Chou, M. R. Bloch, and E. Abbe, “Polar Coding for Secret-Key Generation,” IEEE Transactions on Information Theory, vol. 61, no. 11, pp. 6213–6237, Nov. 2015.
  6. R. A. Chou and M. R. Bloch, “Separation of Reliability and Secrecy in Rate-Limited Secret Key-Distillation,” IEEE Transactions on Information Theory, vol. 60, no. 8, pp. 4941–4957, Aug. 2014.
Conference proceedings
  1. R. A. Chou and M. R. Bloch, “Retractable Commitment,” in Proc. of IEEE Information Theory Workshop, Saint-Malo, France, Apr. 2023, pp. 260–265.
  2. R. Chou and M. R. Bloch, “Commitment over Multiple-Access Channels,” in Proc. of 58th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sep. 2022.
  3. R. A. Chou, M. R. Bloch, and A. Yener, “Universal covertness for Discrete Memoryless Sources,” in 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, Aug. 2016, pp. 516–523.
  4. R. A. Chou and M. R. Bloch, “Using deterministic decisions for low-entropy bits in the encoding and decoding of polar codes,” in Proc. of 53rd Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sep. 2015, pp. 1380–1385.
  5. B. N. Vellambi, M. R. Bloch, R. A. Chou, and J. Kliewer, “Lossless and Lossy Source Compression with Near-Uniform Outputs: Is Common Randomness Always Required?,” in Proc. of IEEE International Symposium on Information Theory, Hong Kong, Jun. 2015, pp. 2171–2175.
  6. R. A. Chou, M. R. Bloch, and J. Kliewer, “Polar Coding for Empirical and Strong Coordination via Distribution Approximation,” in Proc. of IEEE International Symposium on Information Theory, Hong Kong, Jun. 2015, pp. 1512–1516.
  7. R. A. Chou and M. R. Bloch, “Polar Coding for the Broadcast Channel with Confidential Messages,” in Proc. of IEEE Information Theory Workshop, Jerusalem, Israel, Apr. 2015, pp. 1–5.
  8. R. A. Chou, M. R. Bloch, and J. Kliewer, “Low-Complexity Channel Resolvability Codes for the Symmetric Multiple-Access Channel,” in Proc. of IEEE Information Theory Workshop, Hobart, Tasmania, Nov. 2014, pp. 466–470.
  9. R. A. Chou and M. R. Bloch, “Uniform Distributed Source Coding for the Multiple Access Wiretap Channel,” in Proc. of IEEE Conference on Communications and Network Security, San Francisco, CA, Oct. 2014, pp. 127–132.
  10. R. A. Chou and M. R. Bloch, “Secret-Key Generation with Arbitrarily Varying Eavesdropper’s Channel,” in Proc. of Global Conference on Signal and Information Processing, Austin, TX, Sep. 2013, pp. 277–280.
  11. R. A. Chou and M. R. Bloch, “Data compression with nearly uniform ouput,” in Proc. of IEEE International Symposium on Information Theory, Istanbul, Turkey, Jul. 2013, pp. 1979–1983.
  12. R. A. Chou, M. R. Bloch, and E. Abbe, “Polar Coding for Secret-Key Generation,” in Proc. of IEEE Information Theory Workshop, Sevilla, Spain, Apr. 2013, pp. 1–5.
  13. A. J. Pierrot, R. A. Chou, and M. R. Bloch, “Experimental Aspects of Secret-Key Generation in Indoor Wireless Environments,” in Proc. of Signal IEEE 4th Workshop on Signal Processing Advances in Wireless Communications, Apr. 2013.
  14. R. A. Chou and M. R. Bloch, “One-way rate-limited sequential key-distillation,” in Proc. of IEEE International Symposium on Information Theory, Cambridge, MA, Jul. 2012, pp. 1777–1781.