publications

publications by categories in reversed chronological order.

under review - accepted - articles - in limbo - conference proceedings

: abstract - : BibTeX - : arXiv preprint - : published manuscript

under review

  1. T. Erdoğan, T. Kann, A. Nosratinia, and M. R. Bloch, “Covert Communication over Physically-Degraded Alarm Two-Way Channels.” submitted to IEEE Transactions on Information Theory, Jun. 2025.
  2. M.-C. Chang and M. R. Bloch, “Covert Sequential Sensing.” submitted to IEEE Journal of Selected Areas in Communications, Apr. 2025.
  3. S. Bakirtas, M. R. Bloch, and E. Erkip, “Covert Communications of Wireless Hardware Trojans: Positive Rates Through Pilot Manipulation.” submitted to IEEE Journal of Selected Areas in Communications, Apr. 2025.

accepted

  1. S. Guo and M. R. Bloch, “Rate-Reliability Region of Sequential Beam Alignment and Communication.” accepted to IEEE Information Theory Workshop, Jun. 2025.
  2. C. Bouette, L. Luzzi, and M. Bloch, “Covert Capacity of AWGN Channelsunder Average Probability of Error.” accepted to IEEE International Symposium on Information Theory, Apr. 2025.
  3. C. P. Lindstrom and M. R. Bloch, “Rate Distortion Approach to Joint Communicationand Sensing with Markov States: Open Loop Case.” accepted to IEEE International Symposium on Information Theory, Apr. 2025.
  4. Y.-F. Lo and M. R. Bloch, “Active Hypothesis Testing for Quantum Detection of Phase-Shift Keying Coherent States.” accepted to IEEE International Symposium on Information Theory, Apr. 2025.

articles

  1. R. Chou and M. R. Bloch, “Multiuser Commitment over Noisy Channels,” IEEE Transactions on Information Theory, vol. 71, no. 11, pp. 1557–9654, Nov. 2025.
  2. N. Blinn and M. R. Bloch, “Multi-Armed Bandit Dynamic Beam Zooming for mmWave Alignment and Tracking,” IEEE Transactions on Wireless Communications, vol. 24, no. 9, pp. 7908–7922, Sep. 2025.
  3. S.-Y. Wang, K. S. K. Arumugam, and M. R. Bloch, “Bounds on Covert Capacity with Sub-Exponential Random Slot Selection,” ieee_j_it, vol. 71, no. 9, pp. 6586–6601, Sep. 2025.
  4. Z. J. Zhang, M. Bloch, J. Pan, and M. Saeedifard, “A Passive-Active Intrusion Detection Scheme for Multi-Terminal HVDC Grid Line Protection Attacks,” IEEE Transaction on Industrial Electronics, vol. 72, no. 5, pp. 4331–4342, May 2025.
  5. M. Mittelbach, R. F. Schaefer, M. Bloch, A. Yener, and O. Günlü, “Sensing-Assisted Secure Communications over Correlated Rayleigh Fading Channels,” Entropy, vol. 27, no. 3, Feb. 2025.
  6. M. E. Cao, M. Bloch, and S. Coogan, “An Optimistic Approach to Cost-Aware Predictive Control,” Automatica, vol. 176, p. 112263, 2025.
  7. B. Martin Urcelay, M. Bloch, and C. Rozell, “Online Machine Teaching under Learner Uncertainty: Gradient Descent Learners of a Quadratic Loss,” SIAM Journal on Mathematics of Data Science, vol. 7, no. 3, pp. 884–905, 2025.
  8. L. Luzzi, C. Ling, and M. R. Bloch, “Optimal rate-limited secret key generation from Gaussian sources using lattices,” ieee_j_it, vol. 69, no. 8, pp. 4944–4960, Aug. 2023.
  9. M.-C. Chang, S.-Y. Wang, T. Erdoğan, and M. R. Bloch, “Rate and Detection-Error Exponent Tradeoff for Joint Communication and Sensing of Fixed Channel States,” ieee_j_sait, vol. 4, pp. 245–259, May 2023.
  10. O. Günlü, M. R. Bloch, R. F. Schaefer, and A. Yener, “Secure Integrated Sensing and Communication,” ieee_j_sait, vol. 4, pp. 40–53, May 2023.
  11. O. Günlü, M. R. Bloch, and R. Schaeffer, “Private Remote Sources for Secure Multi-Function Computation,” ieee_j_it, vol. 10, no. 68, pp. 1557–9654, Oct. 2022.
  12. M. E. Cao, M. R. Bloch, and S. Coogan, “Efficient Learning of Hyperrectangular Invariant Sets using Gaussian Processes,” IEEE Open Journal of Control Systems, pp. 223–236, Sep. 2022.
  13. H. Zivari-Fard, M. Bloch, and A. Nosratinia, “Keyless Covert Communication via Channel State Information,” ieee_j_it, vol. 68, no. 8, pp. 5440–5474, Aug. 2022.
  14. N. S. Mannem, T.-Y. Huang, E. Erfani, S. Li, M. Bloch, and H. Wang, “A 25–34-GHz Eight-Element MIMO Transmitter for Keyless High Throughput Directionally Secure Communication,” IEEE Journal of Solid-State Circuits, vol. 57, no. 5, pp. 1244–1256, May 2022.
  15. J. Sun, S. Debnath, M. R. Bloch, and M. Saeedifard, “A Hybrid DC Fault Primary Protection Algorithm for Multi-Terminal HVdc Systems,” IEEE Transactions on Power Delivery, vol. 37, no. 2, pp. 1285–1294, Apr. 2022.
  16. S.-Y. Wang and M. R. Bloch, “Covert MIMO Communications under Variational Distance Constraint,” ieee_j_ifs, vol. 16, pp. 4605–4620, Sep. 2021.
  17. R. A. Chou, M. Bloch, and A. Yener, “Universal Covertness for Discrete Memoryless Sources,” ieee_j_it, vol. 67, no. 8, pp. 1557–9654, Aug. 2021.
  18. M.-C. Chang and M. R. Bloch, “Evasive Active Hypothesis Testing,” IEEE Journal on Selected Areas in Information Theory, vol. 2, no. 2, pp. 735–746, Jun. 2021.
  19. M. Tahmasbi and M. R. Bloch, “On Covert Quantum Sensing and the Benefits of Entanglement,” IEEE Journal on Selected Areas in Information Theory, vol. 2, no. 1, pp. 352–365, Mar. 2021.
  20. M. Bloch et al., “An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications,” IEEE Journal on Selected Areas in Information Theory, vol. 2, no. 1, pp. 5–22, Mar. 2021.
  21. M. Le Treust and M. R. Bloch, “State Leakage and Coordination of Actions: Core of the Receiver’s Knowledge,” ieee_j_it, vol. 67, no. 2, pp. 805–823, Feb. 2021.
  22. H. Zivari-Fard, M. Bloch, and A. Nosratinia, “Two-Multicast Channel with Confidential Messages,” ieee_j_ifs, vol. 16, pp. 2743–2758, 2021.
  23. M. Tahmasbi and M. R. Bloch, “Covert and secret key expansion over quantum channels under collective attacks,” ieee_j_it, vol. 66, no. 11, pp. 7113–7131, Nov. 2020.
  24. I. A. Kadampot, M. Tahmasbi, and M. R. Bloch, “Multilevel-Coded Pulse-Position Modulation for Covert Communications over Binary-Input Discrete Memoryless Channels,” ieee_j_it, vol. 66, no. 10, pp. 6001–6023, Oct. 2020.
  25. N. Helal, M. Bloch, and A. Nosratinia, “Cooperative Resolvability and Secrecy in the Cribbing Multiple-Access Channel,” ieee_j_it, vol. 66, no. 9, pp. 5429–5447, Sep. 2020.
  26. G. Cervia, L. Luzzi, M. Le Treust, and M. Bloch, “Strong Coordination of Signals and Actions over Noisy Channels with two-sided State Information,” ieee_j_it, vol. 66, no. 8, pp. 4681–4708, Aug. 2020.
  27. M. Tahmasbi and M. R. Bloch, “Towards Undetectable Quantum Key Distribution over Bosonic Channels,” IEEE Journal on Selected Areas in Information Theory, vol. 1, no. 2, pp. 585–598, Aug. 2020.
  28. M. Tahmasbi and M. R. Bloch, “Steganography Protocols for Quantum Channels,” Journal of Mathematical Physics, vol. 61, no. 8, p. 082201, Aug. 2020.
  29. E. Shipilova, M. Barret, M. Bloch, J.-L. Boelle, and J.-L. Collette, “Simultaneous seismic sources separation based on Matrioshka Orthogonal Matching Pursuit, Application in Oil and Gas Exploration,” IEEE Transactions on Geoscience and Remote Sensing, vol. 58, no. 7, pp. 4529–4546, Jul. 2020.
  30. M. Tahmasbi and M. R. Bloch, “Covert Secret Key Generation with an Active Warden,” ieee_j_ifs, vol. 15, pp. 1026–1039, Jun. 2020.
  31. M. Tahmasbi, A. Savard, and M. R. Bloch, “Covert Capacity of Non-Coherent Rayleigh-Fading Channels,” ieee_j_it, vol. 66, no. 4, pp. 1979–2005, Apr. 2020.
  32. M. Tahmasbi, M. R. Bloch, and A. Yener, “Learning an Adversary’s Actions for Secret Communication,” ieee_j_it, vol. 66, no. 3, pp. 1607–1624, Mar. 2020.
  33. K. S. K. Arumugam and M. R. Bloch, “Covert Communication over a K-User Multiple Access Channel,” ieee_j_it, vol. 65, no. 11, pp. 7020–7044, Nov. 2019.
  34. K. S. K. Arumugam and M. R. Bloch, “Embedding Covert Information in Broadcast Communications,” ieee_j_ifs, vol. 14, no. 10, pp. 2787–2801, Oct. 2019.
  35. M. Tahmasbi and M. R. Bloch, “Framework for covert and secret key expansion over classical-quantum channels,” Physical Review A, vol. 99, no. 5, p. 052329, May 2019.
  36. M. Tahmasbi and M. R. Bloch, “First and Second Order Asymptotics in Covert Communication,” ieee_j_it, vol. 65, no. 4, pp. 2190–2212, Apr. 2019.
  37. R. A. Chou, M. R. Bloch, and J. Kliewer, “Empirical and Strong Coordination via Soft Covering with Polar Codes,” ieee_j_it, vol. 64, no. 7, pp. 5087–5100, Jul. 2018.
  38. B. Larrousse, S. Lasaulce, and M. Bloch, “Coordination in distributed networks via coded actions with application to power control,” ieee_j_it, vol. 64, no. 5, pp. 3633–3654, May 2018.
  39. B. N. Vellambi, J. Kliewer, and M. R. Bloch, “Strong Coordination Over Multi-Hop Line Networks Using Channel Resolvability Codebooks,” ieee_j_it, vol. 64, no. 2, pp. 1132–1162, Feb. 2018.
  40. G. Frèche, M. Bloch, and M. Barret, “Polar Codes for Covert Communications over Asynchronous Discrete Memoryless Channels,” Entropy, vol. 20, no. 1, p. 3, Dec. 2017.
  41. R. A. Chou, B. N. Vellambi, M. R. Bloch, and J. Kliewer, “Coding Schemes for Achieving Strong Secrecy at Negligible Cost,” ieee_j_it, vol. 63, no. 3, pp. 1858–1873, Mar. 2017.
  42. M. R. Bloch, “Covert Communication over Noisy Channels: A Resolvability Perspective,” ieee_j_it, vol. 62, no. 5, pp. 2334–2354, May 2016.
  43. R. A. Chou and M. R. Bloch, “Polar Coding for the Broadcast Channel with Confidential Messages: A Random Binning Analogy,” ieee_j_it, vol. 62, no. 5, pp. 2410–2429, May 2016.
  44. R. A. Chou, M. R. Bloch, and E. Abbe, “Polar Coding for Secret-Key Generation,” ieee_j_it, vol. 61, no. 11, pp. 6213–6237, Nov. 2015.
  45. M. R. Bloch, M. Hayashi, and A. Thangaraj, “Error-Control Coding for Physical-Layer Secrecy,” Proceedings of IEEE, vol. 103, no. 10, pp. 1725–1746, Oct. 2015.
  46. V. Y. F. Tan and M. R. Bloch, “Information Spectrum Approach to Strong Converse Theorems for Degraded Wiretap Channels,” ieee_j_ifs, vol. 10, no. 9, pp. 1891–1904, Sep. 2015.
  47. R. A. Chou and M. R. Bloch, “Separation of Reliability and Secrecy in Rate-Limited Secret Key-Distillation,” ieee_j_it, vol. 60, no. 8, pp. 4941–4957, Aug. 2014.
  48. N. Li et al., “Two approaches for ultrafast random bit generation based on the chaotic dynamics of a semiconductor laser,” Optics Express, vol. 22, no. 6, pp. 6634–6646, Mar. 2014.
  49. M. R. Bloch and J. N. Laneman, “Strong Secrecy from Channel Resolvability,” ieee_j_it, vol. 59, no. 12, pp. 8077–8098, Dec. 2013.
  50. W. K. Harrison, J. Almeida, M. R. Bloch, S. W. McLaughlin, and J. Barros, “Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security,” IEEE Signal Processing Magazine, vol. 30, no. 5, pp. 41–50, Sep. 2013.
  51. M. R. Bloch and J. N. Laneman, “Exploiting Partial Channel State Information for Secrecy over Wireless Channels,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 1840–1849, Sep. 2013.
  52. R. Bassily et al., “Cooperative Security at the Physical Layer: A Summary of Recent Advances,” IEEE Signal Processing Magazine, vol. 30, no. 5, pp. 16–28, Sep. 2013.
  53. F. Renna, M. R. Bloch, and N. Laurenti, “Semi-blind Key-Agreement over MIMO Fading Channels,” IEEE Transactions on Communications, vol. 61, no. 2, pp. 620–627, Feb. 2013.
  54. A. J. Pierrot and M. R. Bloch, “Strongly Secure Communications Over the Two-Way Wiretap Channel,” ieee_j_ifs, vol. 6, no. 3, pp. 595–605, Sep. 2011.
  55. A. Subramanian, A. Thangaraj, M. Bloch, and S. McLaughlin, “Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes,” ieee_j_ifs, vol. 6, no. 3, pp. 585–594, Sep. 2011.
  56. J. P. Vilela, M. Bloch, J. Barros, and S. W. McLaughlin, “Wireless Secrecy Regions with Friendly Jamming,” ieee_j_ifs, vol. 6, no. 2, pp. 256–266, Jun. 2011.
  57. T. F. Wong, M. Bloch, and J. M. Shea, “Secret Sharing over Fast-Fading MIMO Wiretap Channels,” EURASIP Journal on Wireless Communications and Networking, vol. 2009, pp. 506973/1–17, 2009.
  58. M. Bloch, R. Narasimha, and S. W. McLaughlin, “Network Security for Client-Server Architecture using Wiretap Codes,” ieee_j_ifs, vol. 3, no. 3, pp. 404–413, Sep. 2008.
  59. M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, “Wireless Information-Theoretic Security,” ieee_j_it, vol. 54, no. 6, pp. 2515–2534, Jun. 2008.
  60. J. Lodewyck et al., “Quantum key distribution over 25 km with an all-fiber continuous-variable system,” Physical Review A, vol. 76, pp. 042305/1–10, Oct. 2007.
  61. M. Bloch, S. W. McLaughlin, F. Patois, and J.-M. Merolla, “Frequency-Coded Quantum Key Distribution,” Optics Letters, vol. 32, no. 3, pp. 301–303, Feb. 2007.
  62. S. Donnet, A. Thangaraj, M. Bloch, J. Cussey, J.-M. Merolla, and L. Larger, “Security of Y-00 under heterodyne measurement and fast correlation attack,” Physics Letters A, vol. 356, no. 6, pp. 406–410, Aug. 2006.

in limbo

  1. T. Erdoğan, S.-Y. Wang, S.-J. Su, and M. Bloch, “Joint Communication and Sensing with Bipartite Entanglement over Bosonic Channels.” in limbos, Apr. 2025.
  2. N. Blinn and M. R. Bloch, “Track-and-Stop for mmWave Initial Alignment and Tracking.” in limbos, Nov. 2024.
  3. U. Pereg, R. Ferrara, and M. R. Bloch, “Key Assistance, Key Agreement, and Layered Secrecy for Bosonic Broadcast Channels.” in limbo, May 2021.
  4. E. Zhang, M. Bloch, M. Bakshi, and S. Jaggi, “Undetectable Radios: Covert Communication under Spectral Mask Constraints.” in limbo, Dec. 2019.
  5. S. Salimi, M. Bloch, F. Gabry, M. Skoglund, and P. Papadimitratos, “Strong Secrecy in Pairwise Key Agreement over a Generalized Multiple Access Channel.” in limbo, Mar. 2016.
  6. A. J. Pierrot, R. A. Chou, and M. R. Bloch, “The Effect of Eavesdropper’s Statistics in Experimental Wireless Secret-Key Generation.” in limbo, Jun. 2014.

conference proceedings

  1. B. Martin Urcelay, C. J. Rozell, and M. R. Bloch, “Enhancing Human-in-the-Loop Learning for Binary Sentiment Word Classification,” in Proc. of IEEE Conference on Decision and Control, Milan, Italy, Dec. 2024, pp. 2293–2298.
  2. T. Kann, S. Kudekar, and M. Bloch, “A Path Metric Based Construction of Polarization-Adjusted Convolutional Codes,” in ieee_isit, Athens, Greece, Jul. 2024, pp. 2406–2411.
  3. S. Bakirtas, M. Bloch, and E. Erkip, “Pilot-Attacks Can Enable Positive-Rate Covert Communications of Wireless Hardware Trojans,” in Proc. of IEEE Global Communications Conference, Jul. 2024, pp. 1341–1346.
  4. S.-Y. Wang, S.-J. Su, and M. R. Bloch, “Resource-Efficient Entanglement-Assisted Covert Communications over Bosonic Channels,” in ieee_isit, Athens, Greece, Jul. 2024, pp. 3106–3111.
  5. O. Günlü, M. Bloch, and and A. Y. Rafael F. Schaefer, “Nonasymptotic performance limits of low-latency secure integrated sensing and communication systems,” in Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing, Seoul, Korea, Apr. 2024.
  6. S.-Y. Wang, M.-C. Chang, and M. R. Bloch, “Covert Joint Communication and Sensing Under Variational Distance Constraint,” in Proc. of 58th Annual Conference on Information Sciences and Systems, Princeton, JN, Mar. 2024.
  7. T. Kann, S. Kudekar, and M. R. Bloch, “Source Polarization-Adjusted Convolutional Codes,” in ieee_isit, Taipei, Taiwan, Jun. 2023, pp. 1896–1901.
  8. M.-C. Chang and M. R. Bloch, “Distributed Stochastic Bandits with Corrupted and Defective Input Commands,” in ieee_isit, Taipei, Taiwan, Jun. 2023, pp. 1318–1323.
  9. M.-C. Chang, S.-Y. Wang, and M. R. Bloch, “Sequential Joint Communication and Sensing of Fixed Channel States,” in ieee_itw, Saint-Malo, France, Apr. 2023, pp. 462–467.
  10. R. A. Chou and M. R. Bloch, “Retractable Commitment,” in ieee_itw, Saint-Malo, France, Apr. 2023, pp. 260–265.
  11. O. Günlü, M. Bloch, R. Schaeffer, and A. Yener, “Secure Integrated Sensing and Communication for Binary-Modulated Input Additive White Gaussian Noise Channels,” in Proc. of IEEE 3rd International Symposium on Joint Communications & Sensing, Seefeld, Austria, Mar. 2023, pp. 1–6.
  12. Z. J. Zhang, M. Bloch, and M. Saeedifard, “Load Redistribution Attacks in Multi-Terminal DC Grids,” in Proc. of IEEE Energy Conversion Congress and Exposition, Detroit, MI, Oct. 2022.
  13. R. Chou and M. R. Bloch, “Commitment over Multiple-Access Channels,” in Proc. of 58th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sep. 2022.
  14. M.-C. Chang, S.-Y. Wang, and M. R. Bloch, “Controlled Sensing with Corrupted Commands,” in Proc. of 58th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sep. 2022.
  15. S.-Y. Wang, T. Erdoğan, U. Pereg, and M. R. Bloch, “Joint Quantum Communication and Sensing,” in ieee_itw, Aug. 2022, pp. 506–511.
  16. O. Günlü, M. R. Bloch, R. Schaefer, and A. Yener, “Secure Joint Communication and Sensing,” in ieee_isit, Helskinki, Finland, Jun. 2022, pp. 844–849.
  17. M.-C. Chang and M. R. Bloch, “Covert Best Arm Identification of Stochastic Bandits,” in ieee_isit, Helsinki, Finland, Jun. 2022, pp. 324–329.
  18. S.-Y. Wang, T. Erdoğan, and M. R. Bloch, “Towards a Characterization of the Covert Capacity of Bosonic Channels under Trace Distance,” in ieee_isit, Helsinki, Finland, Jun. 2022, pp. 354–359.
  19. H. Zivari-Fard, M. R. Bloch, and A. Nosratinia, “Covert Communication in the Presence of an Uninformed, Informed, and Coordinated Jammer,” in ieee_isit, Helsinki, Finland, Jun. 2022.
  20. M.-C. Chang, T. Erdoğan, S.-Y. Wang, and M. R. Bloch, “Rate and Detection Error-Exponent Tradeoffs of Joint Communication and Sensing,” in Proc. of IEEE International Symposium on Joint Communications & Sensing, Vienna, Austria, Mar. 2022, pp. 1–6.
  21. M. E. Cao, M. Bloch, and S. Coogan, “Estimating High Probability Reachable Sets using Gaussian Processes,” in Proc. of IEEE Conference on Decision and Control, Dec. 2021.
  22. M.-C. Chang and M. R. Bloch, “Covert Sequential Hypothesis Testing,” in ieee_itw, Oct. 2021, pp. 1–6.
  23. U. Pereg, R. Ferrara, and M. R. Bloch, “Key Assistance, Key Agreement, and Layered Secrecy for Bosonic Broadcast Channels,” in ieee_itw, Oct. 2021, pp. 1–6.
  24. H. ZivariFard, M. R. Bloch, and A. Nosratinia, “Covert Communication via Non-Causal Cribbing from a Cooperative Jammer,” in ieee_isit, Jul. 2021, pp. 202–207.
  25. M. Tahmasbi, B. Bash, S. Guha, and M. R. Bloch, “Signaling for Covert Quantum Sensing,” in ieee_isit, Jul. 2021, pp. 1041–1045.
  26. O. Günlü, M. Bloch, and R. F. Schaefer, “Secure Multi-Function Computation with Private Remote Sources,” in ieee_isit, Jul. 2021, pp. 1403–1408.
  27. M.-C. Chang and M. R. Bloch, “Covert Authentication Against a Myopic Adversary,” in ieee_isit, Jul. 2021, pp. 196–201.
  28. S.-Y. Wang and M. R. Bloch, “Explicit Design of Provably Covert Channel Codes,” in ieee_isit, Jul. 2021, pp. 190–195.
  29. N. Blinn, J. Boerger, and M. R. Bloch, “mmWave Beam Steering with Hierarchical Optimal Sampling for Unimodal Bandits,” in IEEE International Conference on Communications, Jun. 2021, pp. 1–6.
  30. G. Canal, M. R. Bloch, and C. Rozell, “Feedback Coding for Active Learning,” in Proc. of The 24th International Conference on Artificial Intelligence and Statistics, Jan. 2021, vol. 130, pp. 1468–1476.
  31. H. Zivari-Fard, M. Bloch, and A. Nosratinia, “Keyless Covert Communication in the Presence of Channel State Information,” in ieee_isit, Los Angeles, CA, Jun. 2020, pp. 834–839.
  32. S.-Y. Wang and M. R. Bloch, “Covert MIMO Communications under Variational Distance Constraint,” in ieee_isit, Los Angeles, CA, Jun. 2020, pp. 828–833.
  33. N. Helal, M. Bloch, and A. Nosratinia, “Resolvability of the Multiple Access Channel with Two-Sided Cooperation,” in ieee_isit, Los Angeles, CA, Jun. 2020.
  34. M.-C. Chang and M. Bloch, “Evasive Active Hypothesis Testing,” in ieee_isit, Los Angeles, CA, Jun. 2020, pp. 1248–1253.
  35. M. Tahmasbi and M. R. Bloch, “Active Covert Sensing,” in ieee_isit, Los Angeles, CA, Jun. 2020, pp. 840–845.
  36. A. Benevento, M. Santos, G. Notarstefano, K. Paynabar, M. Bloch, and M. Egerstedt, “Multi-Robot Coordination for Estimation and Coverage of Unknown Spatial Fields,” in Proc. of IEEE International Conference on Robotics and Automation, Paris, France, May 2020, pp. 7740–7746.
  37. M. Tahmasbi and M. R. Bloch, “Covert Communication with Unknown Code at the Warden,” in Proc. of Allerton Conference on Communication, Control and Computing, Monticello, IL, Sep. 2019, pp. 1060–1067.
  38. H. Zivari-Fard, M. Bloch, and A. Nosratinia, “Keyless Covert Communication in the Presence of Non-causal Channel State Information,” in ieee_itw, Visby, Sweden, Aug. 2019, pp. 1–5.
  39. N. Helal, M. R. Bloch, and A. Nostratinia, “Channel Resolvability with a Full-Duplex Decode-and-Forward Relay,” in ieee_itw, Visby, Sweden, Aug. 2019, pp. 1–5.
  40. I. A. Kadampot, M. Tahmasbi, and M. R. Bloch, “Forward Reconciliation for Covert Key Generation,” in ieee_itw, Visby, Sweden, Aug. 2019, pp. 1–5.
  41. M. Tahmasbi and M. Bloch, “Steganography Protocols for Quantum Channels,” in ieee_isit, Paris, France, Jul. 2019, pp. 2179–2183.
  42. I. A. Kadampot, M. Tahmasbi, and M. R. Bloch, “Codes for Covert Communication over Additive White Gaussian Noise Channels,” in ieee_isit, Paris, France, Jul. 2019, pp. 977–981.
  43. W. Harrison and M. R. Bloch, “Attributes of Generator Matrices for Best Finite Blocklength Wiretap Codes,” in ieee_isit, Paris, France, Jul. 2019, pp. 827–831.
  44. M. Tahmasbi, M. Bloch, and A. Yener, “In-Band Sensing of the Adversary’s Channel for Secure Communication in Wireless Channels,” in ieee_isit, Paris, France, Jul. 2019, pp. 2184–2188.
  45. Q. Zhang, M. Bloch, M. Bakshi, and S. Jaggi, “Undetectable Radios: Covert Communication under Spectral Mask Constraints,” in ieee_isit, Paris, France, Jul. 2019, pp. 992–996.
  46. G. Cervia, L. Luzzi, M. Le Treust, and M. R. Bloch, “Strong coordination over noisy channels with strictly causal encoding,” in Proc. of 56th Annual Allerton Conference on Communication, Control, and Computing, Oct. 2018, pp. 519–526.
  47. W. K. Harrison and M. R. Bloch, “On Dual Relationships of Secrecy Codes,” in Proc. of 56th Annual Allerton Conference on Communication, Control, and Computing, Oct. 2018, pp. 366–372.
  48. I. A. Kadampot, M. Tahmasbi, and M. R. Bloch, “Multilevel-Coded Pulse Position Modulation for Covert Communications,” in ieee_isit, Vail, CO, Jun. 2018, pp. 1864–1868.
  49. N. Helal, M. R. Bloch, and A. Nosratinia, “Multiple-Access Channel Resolvability with Cribbing,” in ieee_isit, Vail, CO, Jun. 2018, pp. 2052–2056.
  50. K. S. K. Arumugam, M. R. Bloch, and L. Wang, “Covert Communication over a Physically Degraded Relay Channel with Non-Colluding Wardens,” in ieee_isit, Vail, CO, Jun. 2018, pp. 766–770.
  51. K. S. K. Arumugam and M. R. Bloch, “Covert communication over broadcast channels,” in ieee_itw, Kaohsiung, Taiwan, Nov. 2017, pp. 299–303.
  52. M. Tahmasbi, M. R. Bloch, and V. F. Tan, “Error exponents covert communications,” in ieee_itw, Kaohsiung, Taiwan, Nov. 2017, pp. 304–308.
  53. M. Tahmasbi and M. R. Bloch, “Covert secret key generation,” in Proc. of IEEE Conference on Communications and Network Security, Workshop on Physical-Layer Methods for Wireless Security, Las Vegas, NV, Oct. 2017, pp. 540–544.
  54. E. Shipilova, J.-L. Boelle, M. Bloch, M. Barret, and J.-L. Collette, “Matrioshka orthogonal matching pursuit for blended seismic source separation,” in Proc. of SEG International Exposition and Annual Meeting, Houston, TX, Sep. 2017.
  55. H. Zivari-Fard, M. Bloch, and A. Nosratinia, “Two-Transmitter Two-Receiver Channel with Confidential Messages,” in Proc. of Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sep. 2017.
  56. M. Tahmasbi, M. R. Bloch, and A. Yener, “Learning Adversary’s Actions for Secret Communication,” in ieee_isit, Aachen, Germany, Jun. 2017, pp. 2713–2717.
  57. M. R. Bloch and S. Guha, “Optimal Covert Communications using Pulse-Position Modulation,” in ieee_isit, Aachen, Germany, Jun. 2017, pp. 2835–2839.
  58. G. Cervia, L. Luzzi, M. L. Treust, and M. R. Bloch, “Strong Coordination of Signals and Actions over Noisy Channels,” in ieee_isit, Aachen, Germany, Jun. 2017, pp. 2845–2849.
  59. E. Shipilova, J.-L. Boelle, M. Barret, M. Bloch, and J.-L. Collette, “Separation of impulsive blended seismic sources using Orthogonal Matching Pursuit,” in 79th Annual International Conference and Exhibition EAGE, Paris, France, Jun. 2017.
  60. I. A. Kadampot and M. R. Bloch, “Coordination with Clustered Common Randomness in a Three-Terminal Line Network,” in ieee_isit, Aachen, Germany, Jun. 2017, pp. 1828–1832.
  61. G. Frèche, M. R. Bloch, and M. Barret, “Polar codes for covert communications over asynchronous Discrete Memoryless Channels,” in Proc. of 51st Annual Conference on Information Sciences and Systems, Baltimore, MD, Mar. 2017, pp. 1–1.
  62. K. S. K. Arumugam, I. A. Kadampot, M. Tahmasbi, S. Shah, M. Bloch, and S. Pokutta, “Modulation recognition using side information and hybrid learning,” in Proc. IEEE Int. Symp. Dynamic Spectrum Access Networks (DySPAN), Piscataway, NJ, Mar. 2017, pp. 1–2.
  63. G. Cervia, L. Luzzi, M. R. Bloch, and M. L. Treust, “Polar coding for empirical coordination of signals and actions over noisy channels,” in ieee_itw, Cambridge, United Kingdom, Sep. 2016, pp. 81–85.
  64. M. Tahmasbi and M. R. Bloch, “Second Order Asymptotics for Degraded Wiretap Channels: How Good Are Existing Codes?,” in 54th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sep. 2016, pp. 830–837.
  65. K. S. K. Arumugam and M. R. Bloch, “Keyless asynchronous covert communication,” in ieee_itw, Cambridge, United Kingdom, Sep. 2016, pp. 191–195.
  66. R. A. Chou, M. R. Bloch, and A. Yener, “Universal covertness for Discrete Memoryless Sources,” in 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, Aug. 2016, pp. 516–523.
  67. B. N. Vellambi, J. Kliewer, and M. R. Bloch, “Lossy Compression with Near-uniform Encoder Outputs,” in ieee_isit, Barcelona, Spain, Jul. 2016, pp. 530–534.
  68. M. Tahmasbi and M. R. Bloch, “Second-Order Asymptotics of Covert Communications over Noisy Channels,” in ieee_isit, Barcelona, Spain, Jul. 2016, pp. 2224–2228.
  69. K. S. K. Arumugam and M. R. Bloch, “Keyless Covert Communication over Multiple-Access Channels,” in ieee_isit, Barcelona, Spain, Jul. 2016, pp. 2229–2233.
  70. M. Le Treust and M. R. Bloch, “Empirical Coordination, State Masking and State Amplification: Core of the Decoder’s Knowledge,” in ieee_isit, Barcelona, Spain, Jul. 2016, pp. 895–899.
  71. B. N. Vellambi, J. Kliewer, and M. R. Bloch, “Strong coordination over a line when actions are Markovian,” in Proc. of Annual Conference on Information Science and Systems, Princeton, NJ, Mar. 2016, pp. 412–417.
  72. R. A. Chou and M. R. Bloch, “Using deterministic decisions for low-entropy bits in the encoding and decoding of polar codes,” in Proc. of 53rd Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sep. 2015, pp. 1380–1385.
  73. B. N. Vellambi, J. Kliewer, and M. Bloch, “Strong Coordination over Multi-hop Line Networks,” in ieee_itw, Jeju, Korea, Jul. 2015, pp. 192–196.
  74. M. R. Bloch, “A Channel Resolvability Perspective on Stealth Communications,” in ieee_isit, Hong Kong, Jun. 2015, pp. 2535–2539.
  75. R. A. Chou, M. R. Bloch, and J. Kliewer, “Polar Coding for Empirical and Strong Coordination via Distribution Approximation,” in ieee_isit, Hong Kong, Jun. 2015, pp. 1512–1516.
  76. B. N. Vellambi, M. R. Bloch, R. A. Chou, and J. Kliewer, “Lossless and Lossy Source Compression with Near-Uniform Outputs: Is Common Randomness Always Required?,” in ieee_isit, Hong Kong, Jun. 2015, pp. 2171–2175.
  77. R. A. Chou and M. R. Bloch, “Polar Coding for the Broadcast Channel with Confidential Messages,” in ieee_itw, Jerusalem, Israel, Apr. 2015, pp. 1–5.
  78. M. R. Bloch and J. Kliewer, “Strong Coordination over a Three-Terminal Relay Network,” in ieee_itw, Hobart, Tasmania, Nov. 2014, pp. 646–650.
  79. R. A. Chou, M. R. Bloch, and J. Kliewer, “Low-Complexity Channel Resolvability Codes for the Symmetric Multiple-Access Channel,” in ieee_itw, Hobart, Tasmania, Nov. 2014, pp. 466–470.
  80. R. A. Chou and M. R. Bloch, “Uniform Distributed Source Coding for the Multiple Access Wiretap Channel,” in Proc. of IEEE Conference on Communications and Network Security, San Francisco, CA, Oct. 2014, pp. 127–132.
  81. V. Y. F. Tan and M. R. Bloch, “Information spectrum approach to strong converse theorems for degraded wiretap channels,” in Proc. of 52nd Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sep. 2014, pp. 747–754.
  82. N. Li et al., “Ultrafast Random Bit Generation Based on the Chaotic Dynamics of a Semiconductor Laser,” in Proc. of CLEO, San Jose, CA, Jun. 2014, pp. 1–2.
  83. J. J. Boutros, V. Dedeoglu, and M. R. Bloch, “The Anti-Diversity Concept for Secure Communication on a Two-Link Compound Channel,” in Proc. of International Zurich Seminar on Communications, Zurich, Switzerland, Feb. 2014.
  84. R. A. Chou and M. R. Bloch, “Secret-Key Generation with Arbitrarily Varying Eavesdropper’s Channel,” in Proc. of Global Conference on Signal and Information Processing, Austin, TX, Sep. 2013, pp. 277–280.
  85. R. A. Chou and M. R. Bloch, “Data compression with nearly uniform ouput,” in ieee_isit, Istanbul, Turkey, Jul. 2013, pp. 1979–1983.
  86. C. Ling, L. Luzzi, and M. R. Bloch, “Secret key generation from Gaussian sources using lattice hashing,” in ieee_isit, Istanbul, Turkey, Jul. 2013, pp. 2621–2625.
  87. M. R. Bloch and J. Kliewer, “Strong coordination over a line network,” in ieee_isit, Istanbul, Turkey, Jul. 2013, pp. 2319–2323.
  88. A. J. Pierrot, R. A. Chou, and M. R. Bloch, “Experimental Aspects of Secret-Key Generation in Indoor Wireless Environments,” in Proc. of Signal IEEE 4th Workshop on Signal Processing Advances in Wireless Communications, Apr. 2013.
  89. R. A. Chou, M. R. Bloch, and E. Abbe, “Polar Coding for Secret-Key Generation,” in ieee_itw, Sevilla, Spain, Apr. 2013, pp. 1–5.
  90. A. J. Pierrot and M. R. Bloch, “Joint Channel Intrinsic Randomness and Channel Resolvability,” in ieee_itw, Sevilla, Spain, Apr. 2013, pp. 1–5.
  91. F. Renna et al., “Low-power secret key agreement over OFDM,” in Proc. of the 2nd ACM workshop on Hot topics on wireless network security and privacy, Budapest, Hungary, Apr. 2013, pp. 43–48.
  92. M. R. Bloch, L. Luzzi, and J. Kliewer, “Strong Coordination with Polar Codes,” in Proc. of 50th Allerton Conference on Communication, Control, and Computing, Monticello, IL, Oct. 2012, pp. 565–571.
  93. A. J. Pierrot and M. R. Bloch, “LDPC-based coded cooperative jamming codes,” in ieee_itw, Lausanne, Switzerland, Sep. 2012, pp. 462–466.
  94. M. R. Bloch and J. Kliewer, “On secure communication with constrained randomization,” in ieee_isit, Cambridge, MA, Jul. 2012, pp. 1172–1176.
  95. R. A. Chou and M. R. Bloch, “One-way rate-limited sequential key-distillation,” in ieee_isit, Cambridge, MA, Jul. 2012, pp. 1777–1781.
  96. M. R. Bloch, “Achieving Secrecy: capacity vs. Resolvability,” in ieee_isit, Saint Petersburg, Russia, Aug. 2011, pp. 632–636.
  97. F. Renna, M. Bloch, and N. Laurenti, “Semi-Blind Key-Agreement over MIMO Fading Channels,” in Proc. of IEEE International Conference on Communications, Kyoto, Japan, Jun. 2011, pp. 1–6.
  98. L. Luzzi and M. R. Bloch, “Capacity-based random codes cannot achieve strong secrecy over symmetric wiretap channels,” in Proc. of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, Cachan, France, May 2011, pp. 641–647.
  99. F. Renna, M. Bloch, and N. Laurenti, “Semi-Blind Key-Agreement over MIMO Quasi-Static Channels,” in Proc. of 2011 NEWCOM/COST Joint Workshop, Paris, France, Mar. 2011, pp. 1–6.
  100. A. T. Suresh, A. Subramanian, A. Thangaraj, M. Bloch, and S. McLaughlin, “Strong Secrecy for Erasure Wiretap Channels,” in ieee_itw, Dublin, Ireland, Sep. 2010.
  101. A. Subramanian, A. T. Suresh, A. Thangaraj, M. Bloch, and S. McLaughlin, “Strong and Weak Secrecy in Wiretap Channels,” in Proc. of 6th International Symposium on Turbo Codes and Iterative Information Processing, Brest, France, Sep. 2010, pp. 30–34.
  102. M. Bloch, “Channel Intrinsic Randomness,” in ieee_isit, Austin, TX, Jun. 2010, pp. 2607–2611.
  103. J. P. Vilela, M. Bloch, J. Barros, and S. W. McLaughlin, “Friendly Jamming for Wireless Secrecy,” in Proc. of IEEE International Conference on Communications, Cape Town, South Africa, May 2010, pp. 1550–3607.
  104. M. Rodrigues, A. Somekh-Baruch, and M. Bloch, “On Gaussian Wiretap Channels with Arbitrary Inputs,” in Proc. of European Wireless, Lucca, Italy, Apr. 2010, pp. 774–781.
  105. E. MolavianJazi, M. Bloch, and J. N. Laneman, “Arbitrary Jamming Can Preclude Secure Communications,” in Proc. 47th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sep. 2009, pp. 1069–1075.
  106. M. Bloch, “Channel Scrambling for Secrecy,” in ieee_isit, Seoul, Korea, Jul. 2009, pp. 2452–2456.
  107. B. P. Dunn, M. Bloch, and J. N. Laneman, “Secure bits through queues,” in ieee_itw, Volos, Greece, Jun. 2009, pp. 37–41.
  108. M. Bloch and J. N. Laneman, “Information-Spectrum Methods for Information-Theoretic Security,” in Proc. Information Theory and Applications Workshop, San Diego, CA, Feb. 2009, pp. 23–28.
  109. M. Bloch and J. N. Laneman, “On the Secrecy Capacity of Arbitrary Wiretap Channels,” in Proceedings of 46th Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sep. 2008, pp. 818–825.
  110. J. Barros and M. Bloch, “Strong Secrecy for Wireless Channels,” in Information Theoretic Security, Calgary, Canada, Aug. 2008, pp. 40–53.
  111. M. Bloch and A. Thangaraj, “Confidential Messages to a Cooperative Relay,” in ieee_itw, Porto, Portugal, May 2008, pp. 154–158.
  112. S. Fossier et al., “Quantum Key Distribution over 25 km Using a Fiber Setup Based on Continuous Variables,” in Proc. of CLEO/QELS, San Jose, CA, May 2008, pp. 1–2.
  113. M. Bloch, R. Narasimha, and S. W. McLaughlin, “Client-Server Architecture Design based on Wiretap Codes,” in Proc of the 2008 International Zurich Seminar on Communications, Zurich, Switzerland, Mar. 2008, pp. 44–47.
  114. E. Diamanti et al., “Implementation of an all-fiber continuous variables quantum key distribution system,” in International Conference on Quantum Information Processing and Communication, Barcelona, Spain, Oct. 2007.
  115. M. Bloch, J. Barros, and S. W. McLaughlin, “Practical Information-Theoretic Commitment,” in Proc. 45th Allerton Conference on Communication Control and Computing, Monticello, IL, Sep. 2007, pp. 1035–1039.
  116. J. Lodewyck et al., “Quantum key distribution device with coherent states,” in Proc. of SPIE Optics East, Boston, MA, USA, Sep. 2007, vol. 6780, pp. 67800Z/1–14.
  117. J. Lodewyck et al., “Distribution quantique de clé a 25 km au moyen d’un dispositif fibré utilisant des variables continues,” in 10eme Colloque sur les Lasers et l’Optique Quantique, Grenoble, France, Jul. 2007.
  118. S. Kaimalettu, A. Thangaraj, M. Bloch, and S. W. McLaughlin, “Constellation Shaping using LDPC Codes,” in ieee_isit, Nice, France, Jun. 2007, pp. 2366–2370.
  119. M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, “Information Theoretic Security for Wireless Channels - Theory and Practice,” in Proc. 2007 Information Theory and Application Workshop, San Diego, CA, USA, Feb. 2007.
  120. M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, “LDPC-based Secure Wireless Communication with Imperfect Knowledge of the Eavesdropper’s Channels,” in ieee_itw, Chengdu, China, Oct. 2006, pp. 155–159.
  121. M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, “An Opportunistic Physical-Layer Approach to Secure Wireless Communications,” in Proc. 44th Allerton Conference on Communication Control and Computing, Monticello, IL, Sep. 2006, pp. 849–854.
  122. S. Donnet, A. Thangaraj, M. Bloch, J. Cussey, J.-M. Merolla, and L. Larger, “Cryptanalysis of Y-00 under Heterodyne Measurement and Fast Correlation Attack,” in Proc. European Conference on Optical Communication, Cannes, France, Sep. 2006, pp. 1–2.
  123. M. Bloch, A. Thangaraj, S. W. McLaughlin, and J.-M. Merolla, “LDPC-based Secret Key Agreement over the Gaussian wiretap channel,” in ieee_isit, Seattle, USA, Jul. 2006, pp. 1179–1183.
  124. M. Bloch, A. Thangaraj, S. W. McLaughlin, and J.-M. Merolla, “LDPC-based Gaussian Key Reconciliation,” in ieee_itw, Punta del Este, Uruguay, Mar. 2006, pp. 116–120.
  125. J. Cussey, M. Bloch, A. Thangaraj, J.-M. Merolla, and S. W. McLaughlin, “Integrated Direct-Modulation Based Quantum Cryptography System,” in Proc. Optical Network and Technologies, Pisa, Italy, Oct. 2004, pp. 390–395.
  126. J. Cussey, M. Bloch, A. Thangaraj, J.-M. Merolla, and S. W. McLaughlin, “Direct-Modulation Scheme for Free-Space Quantum Cryptography,” in Proc. European Conference on Optical Communication, Stockholm, Sweden, Sep. 2004.