publications

publications by categories in reversed chronological order.

under review - accepted - articles - in limbo - conference proceedings

: abstract - : BibTeX - : arXiv preprint - : published manuscript

under review

  1. R. Chou and M. R. Bloch, “Multiuser Commitment over Noisy Channels.” submitted to IEEE Transactions on Information Theory, Nov. 2024.
  2. N. Blinn and M. R. Bloch, “Track-and-Stop for mmWave Initial Alignment and Tracking.” submitted to IEEE International Conference on Communications, Nov. 2024.
  3. M. Mittelbach, R. F. Schaefer, M. Bloch, A. Yener, and O. Günlü, “Secure Integrated Sensing and Communication Under Correlated Rayleigh Fading.” submitted to IEEE Symposium on Joint Communication and Sensing, Oct. 2024.
  4. N. Blinn and M. R. Bloch, “Multi-Armed Bandit Dynamic Beam Zooming for mmWave Alignment and Tracking.” submitted to IEEE Transactions on Wireless Communications, Sep. 2024.
  5. S.-Y. Wang, K. Arumugam, and M. R. Bloch, “Bounds on Covert Capacity in the Sub-Exponential Slotted Asynchronous Regime.” submitted to IEEE Transactions on Information Theory, Sep. 2024.
  6. B. M. Urcelay, M. Bloch, and C. Rozell, “Online Machine Teaching under Learner Uncertainty: Gradient Descent Learners of a Quadratic Loss.” submitted to SIAM Journal on Mathematics of Data Science, May 2024.

accepted

  1. Z. J. (J. Zhang, M. Bloch, J. Pan, and M. Saeedifard, “A Passive-Active Intrusion Detection Scheme for Multi-Terminal HVDC Grid Line Protection Attacks,” IEEE Transaction on Industrial Electronics. accepted to IEEE Transactions on Industrial Electronics, Sep. 2024.
  2. B. Martin-Urcelay, C. J. Rozell, and M. R. Bloch, “Enhancing Human-in-the-Loop Learning for Binary Sentiment Word Classification.” accepted to Conference on Decision and Control, Jul. 2024.
  3. S. Bakirtas, M. Bloch, and E. Erkip, “Pilot-Attacks Can Enable Positive-Rate Covert Communications of Wireless Hardware Trojans.” accepted to IEEE GLOBECOM, Jul. 2024.

articles

  1. L. Luzzi, C. Ling, and M. R. Bloch, “Optimal rate-limited secret key generation from Gaussian sources using lattices,” IEEE Transactions on Information Theory, vol. 69, no. 8, pp. 4944–4960, Aug. 2023.
  2. O. Günlü, M. R. Bloch, R. F. Schaefer, and A. Yener, “Secure Integrated Sensing and Communication,” IEEE Journal on Selected Areas in Information Theory, vol. 4, pp. 40–53, May 2023.
  3. M.-C. Chang, S.-Y. Wang, T. Erdoğan, and M. R. Bloch, “Rate and Detection-Error Exponent Tradeoff for Joint Communication and Sensing of Fixed Channel States,” IEEE Journal on Selected Areas in Information Theory, vol. 4, pp. 245–259, May 2023.
  4. O. Günlü, M. R. Bloch, and R. Schaeffer, “Private Remote Sources for Secure Multi-Function Computation,” IEEE Transactions on Information Theory, vol. 10, no. 68, pp. 1557–9654, Oct. 2022.
  5. M. E. Cao, M. R. Bloch, and S. Coogan, “Efficient Learning of Hyperrectangular Invariant Sets using Gaussian Processes,” IEEE Open Journal of Control Systems, pp. 223–236, Sep. 2022.
  6. H. Zivari-Fard, M. Bloch, and A. Nosratinia, “Keyless Covert Communication via Channel State Information,” IEEE Transactions on Information Theory, vol. 68, no. 8, pp. 5440–5474, Aug. 2022.
  7. N. S. Mannem, T.-Y. Huang, E. Erfani, S. Li, M. Bloch, and H. Wang, “A 25–34-GHz Eight-Element MIMO Transmitter for Keyless High Throughput Directionally Secure Communication,” IEEE Journal of Solid-State Circuits, vol. 57, no. 5, pp. 1244–1256, May 2022.
  8. J. Sun, S. Debnath, M. R. Bloch, and M. Saeedifard, “A Hybrid DC Fault Primary Protection Algorithm for Multi-Terminal HVdc Systems,” IEEE Transactions on Power Delivery, vol. 37, no. 2, pp. 1285–1294, Apr. 2022.
  9. S.-Y. Wang and M. R. Bloch, “Covert MIMO Communications under Variational Distance Constraint,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 4605–4620, Sep. 2021.
  10. R. A. Chou, M. Bloch, and A. Yener, “Universal Covertness for Discrete Memoryless Sources,” IEEE Transactions on Information Theory, vol. 67, no. 8, pp. 1557–9654, Aug. 2021.
  11. M.-C. Chang and M. R. Bloch, “Evasive Active Hypothesis Testing,” IEEE Journal on Selected Areas in Information Theory, vol. 2, no. 2, pp. 735–746, Jun. 2021.
  12. M. Bloch et al., “An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications,” IEEE Journal on Selected Areas in Information Theory, vol. 2, no. 1, pp. 5–22, Mar. 2021.
  13. M. Tahmasbi and M. R. Bloch, “On Covert Quantum Sensing and the Benefits of Entanglement,” IEEE Journal on Selected Areas in Information Theory, vol. 2, no. 1, pp. 352–365, Mar. 2021.
  14. M. Le Treust and M. R. Bloch, “State Leakage and Coordination of Actions: Core of the Receiver’s Knowledge,” IEEE Transactions on Information Theory, vol. 67, no. 2, pp. 805–823, Feb. 2021.
  15. H. Zivari-Fard, M. Bloch, and A. Nosratinia, “Two-Multicast Channel with Confidential Messages,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2743–2758, 2021.
  16. M. Tahmasbi and M. R. Bloch, “Covert and secret key expansion over quantum channels under collective attacks,” IEEE Transactions on Information Theory, vol. 66, no. 11, pp. 7113–7131, Nov. 2020.
  17. I. A. Kadampot, M. Tahmasbi, and M. R. Bloch, “Multilevel-Coded Pulse-Position Modulation for Covert Communications over Binary-Input Discrete Memoryless Channels,” IEEE Transactions on Information Theory, vol. 66, no. 10, pp. 6001–6023, Oct. 2020.
  18. N. Helal, M. Bloch, and A. Nosratinia, “Cooperative Resolvability and Secrecy in the Cribbing Multiple-Access Channel,” IEEE Transactions on Information Theory, vol. 66, no. 9, pp. 5429–5447, Sep. 2020.
  19. G. Cervia, L. Luzzi, M. Le Treust, and M. Bloch, “Strong Coordination of Signals and Actions over Noisy Channels with two-sided State Information,” IEEE Transactions on Information Theory, vol. 66, no. 8, pp. 4681–4708, Aug. 2020.
  20. M. Tahmasbi and M. R. Bloch, “Steganography Protocols for Quantum Channels,” Journal of Mathematical Physics, vol. 61, no. 8, p. 082201, Aug. 2020.
  21. M. Tahmasbi and M. R. Bloch, “Towards Undetectable Quantum Key Distribution over Bosonic Channels,” IEEE Journal on Selected Areas in Information Theory, vol. 1, no. 2, pp. 585–598, Aug. 2020.
  22. E. Shipilova, M. Barret, M. Bloch, J.-L. Boelle, and J.-L. Collette, “Simultaneous seismic sources separation based on Matrioshka Orthogonal Matching Pursuit, Application in Oil and Gas Exploration,” IEEE Transactions on Geoscience and Remote Sensing, vol. 58, no. 7, pp. 4529–4546, Jul. 2020.
  23. M. Tahmasbi and M. R. Bloch, “Covert Secret Key Generation with an Active Warden,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 1026–1039, Jun. 2020.
  24. M. Tahmasbi, A. Savard, and M. R. Bloch, “Covert Capacity of Non-Coherent Rayleigh-Fading Channels,” IEEE Transactions on Information Theory, vol. 66, no. 4, pp. 1979–2005, Apr. 2020.
  25. M. Tahmasbi, M. R. Bloch, and A. Yener, “Learning an Adversary’s Actions for Secret Communication,” IEEE Transactions on Information Theory, vol. 66, no. 3, pp. 1607–1624, Mar. 2020.
  26. K. S. K. Arumugam and M. R. Bloch, “Covert Communication over a K-User Multiple Access Channel,” IEEE Transactions on Information Theory, vol. 65, no. 11, pp. 7020–7044, Nov. 2019.
  27. K. S. K. Arumugam and M. R. Bloch, “Embedding Covert Information in Broadcast Communications,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 10, pp. 2787–2801, Oct. 2019.
  28. M. Tahmasbi and M. R. Bloch, “Framework for covert and secret key expansion over classical-quantum channels,” Physical Review A, vol. 99, no. 5, p. 052329, May 2019.
  29. M. Tahmasbi and M. R. Bloch, “First and Second Order Asymptotics in Covert Communication,” IEEE Transactions on Information Theory, vol. 65, no. 4, pp. 2190–2212, Apr. 2019.
  30. R. A. Chou, M. R. Bloch, and J. Kliewer, “Empirical and Strong Coordination via Soft Covering with Polar Codes,” IEEE Transactions on Information Theory, vol. 64, no. 7, pp. 5087–5100, Jul. 2018.
  31. B. Larrousse, S. Lasaulce, and M. Bloch, “Coordination in distributed networks via coded actions with application to power control,” IEEE Transactions on Information Theory, vol. 64, no. 5, pp. 3633–3654, May 2018.
  32. B. N. Vellambi, J. Kliewer, and M. R. Bloch, “Strong Coordination Over Multi-Hop Line Networks Using Channel Resolvability Codebooks,” IEEE Transactions on Information Theory, vol. 64, no. 2, pp. 1132–1162, Feb. 2018.
  33. G. Frèche, M. Bloch, and M. Barret, “Polar Codes for Covert Communications over Asynchronous Discrete Memoryless Channels,” Entropy, vol. 20, no. 1, p. 3, Dec. 2017.
  34. R. A. Chou, B. N. Vellambi, M. R. Bloch, and J. Kliewer, “Coding Schemes for Achieving Strong Secrecy at Negligible Cost,” IEEE Transactions on Information Theory, vol. 63, no. 3, pp. 1858–1873, Mar. 2017.
  35. R. A. Chou and M. R. Bloch, “Polar Coding for the Broadcast Channel with Confidential Messages: A Random Binning Analogy,” IEEE Transactions on Information Theory, vol. 62, no. 5, pp. 2410–2429, May 2016.
  36. M. R. Bloch, “Covert Communication over Noisy Channels: A Resolvability Perspective,” IEEE Transactions on Information Theory, vol. 62, no. 5, pp. 2334–2354, May 2016.
  37. R. A. Chou, M. R. Bloch, and E. Abbe, “Polar Coding for Secret-Key Generation,” IEEE Transactions on Information Theory, vol. 61, no. 11, pp. 6213–6237, Nov. 2015.
  38. M. R. Bloch, M. Hayashi, and A. Thangaraj, “Error-Control Coding for Physical-Layer Secrecy,” Proceedings of IEEE, vol. 103, no. 10, pp. 1725–1746, Oct. 2015.
  39. V. Y. F. Tan and M. R. Bloch, “Information Spectrum Approach to Strong Converse Theorems for Degraded Wiretap Channels,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 9, pp. 1891–1904, Sep. 2015.
  40. R. A. Chou and M. R. Bloch, “Separation of Reliability and Secrecy in Rate-Limited Secret Key-Distillation,” IEEE Transactions on Information Theory, vol. 60, no. 8, pp. 4941–4957, Aug. 2014.
  41. N. Li et al., “Two approaches for ultrafast random bit generation based on the chaotic dynamics of a semiconductor laser,” Optics Express, vol. 22, no. 6, pp. 6634–6646, Mar. 2014.
  42. M. R. Bloch and J. N. Laneman, “Strong Secrecy from Channel Resolvability,” IEEE Transactions on Information Theory, vol. 59, no. 12, pp. 8077–8098, Dec. 2013.
  43. R. Bassily et al., “Cooperative Security at the Physical Layer: A Summary of Recent Advances,” IEEE Signal Processing Magazine, vol. 30, no. 5, pp. 16–28, Sep. 2013.
  44. W. K. Harrison, J. Almeida, M. R. Bloch, S. W. McLaughlin, and J. Barros, “Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security,” IEEE Signal Processing Magazine, vol. 30, no. 5, pp. 41–50, Sep. 2013.
  45. M. R. Bloch and J. N. Laneman, “Exploiting Partial Channel State Information for Secrecy over Wireless Channels,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 1840–1849, Sep. 2013.
  46. F. Renna, M. R. Bloch, and N. Laurenti, “Semi-blind Key-Agreement over MIMO Fading Channels,” IEEE Transactions on Communications, vol. 61, no. 2, pp. 620–627, Feb. 2013.
  47. A. Subramanian, A. Thangaraj, M. Bloch, and S. McLaughlin, “Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 585–594, Sep. 2011.
  48. A. J. Pierrot and M. R. Bloch, “Strongly Secure Communications Over the Two-Way Wiretap Channel,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 595–605, Sep. 2011.
  49. J. P. Vilela, M. Bloch, J. Barros, and S. W. McLaughlin, “Wireless Secrecy Regions with Friendly Jamming,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 2, pp. 256–266, Jun. 2011.
  50. T. F. Wong, M. Bloch, and J. M. Shea, “Secret Sharing over Fast-Fading MIMO Wiretap Channels,” EURASIP Journal on Wireless Communications and Networking, vol. 2009, pp. 506973/1–17, 2009.
  51. M. Bloch, R. Narasimha, and S. W. McLaughlin, “Network Security for Client-Server Architecture using Wiretap Codes,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, pp. 404–413, Sep. 2008.
  52. M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, “Wireless Information-Theoretic Security,” IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2515–2534, Jun. 2008.
  53. J. Lodewyck et al., “Quantum key distribution over 25 km with an all-fiber continuous-variable system,” Physical Review A, vol. 76, pp. 042305/1–10, Oct. 2007.
  54. M. Bloch, S. W. McLaughlin, F. Patois, and J.-M. Merolla, “Frequency-Coded Quantum Key Distribution,” Optics Letters, vol. 32, no. 3, pp. 301–303, Feb. 2007.
  55. S. Donnet, A. Thangaraj, M. Bloch, J. Cussey, J.-M. Merolla, and L. Larger, “Security of Y-00 under heterodyne measurement and fast correlation attack,” Physics Letters A, vol. 356, no. 6, pp. 406–410, Aug. 2006.

in limbo

  1. U. Pereg, R. Ferrara, and M. R. Bloch, “Key Assistance, Key Agreement, and Layered Secrecy for Bosonic Broadcast Channels.” in limbo, May 2021.
  2. E. Zhang, M. Bloch, M. Bakshi, and S. Jaggi, “Undetectable Radios: Covert Communication under Spectral Mask Constraints.” in limbo, Dec. 2019.
  3. S. Salimi, M. Bloch, F. Gabry, M. Skoglund, and P. Papadimitratos, “Strong Secrecy in Pairwise Key Agreement over a Generalized Multiple Access Channel.” in limbo, Mar. 2016.
  4. A. J. Pierrot, R. A. Chou, and M. R. Bloch, “The Effect of Eavesdropper’s Statistics in Experimental Wireless Secret-Key Generation.” in limbo, Jun. 2014.

conference proceedings

  1. S.-Y. Wang, S.-J. Su, and M. R. Bloch, “Resource-Efficient Entanglement-Assisted Covert Communications over Bosonic Channels,” in Proc. of IEEE International Symposium on Information Theory, Athens, Greece, Jul. 2024, pp. 3106–3111.
  2. T. Kann, S. Kudekar, and M. Bloch, “A Path Metric Based Construction of Polarization-Adjusted Convolutional Codes,” in Proc. of IEEE International Symposium on Information Theory, Athens, Greece, Jul. 2024, pp. 2406–2411.
  3. O. Günlü, M. Bloch, and and A. Y. Rafael F. Schaefer, “Nonasymptotic performance limits of low-latency secure integrated sensing and communication systems,” in Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing, Seoul, Korea, Apr. 2024.
  4. S.-Y. Wang, M.-C. Chang, and M. R. Bloch, “Covert Joint Communication and Sensing Under Variational Distance Constraint,” in Proc. of 58th Annual Conference on Information Sciences and Systems, Princeton, JN, Mar. 2024.
  5. T. Kann, S. Kudekar, and M. R. Bloch, “Source Polarization-Adjusted Convolutional Codes,” in Proc. of IEEE International Symposium on Information Theory, Taipei, Taiwan, Jun. 2023, pp. 1896–1901.
  6. M.-C. Chang and M. R. Bloch, “Distributed Stochastic Bandits with Corrupted and Defective Input Commands,” in Proc. of IEEE International Symposium on Information Theory, Taipei, Taiwan, Jun. 2023, pp. 1318–1323.
  7. R. A. Chou and M. R. Bloch, “Retractable Commitment,” in Proc. of IEEE Information Theory Workshop, Saint-Malo, France, Apr. 2023, pp. 260–265.
  8. M.-C. Chang, S.-Y. Wang, and M. R. Bloch, “Sequential Joint Communication and Sensing of Fixed Channel States,” in Proc. of IEEE Information Theory Workshop, Saint-Malo, France, Apr. 2023, pp. 462–467.
  9. O. Günlü, M. Bloch, R. Schaeffer, and A. Yener, “Secure Integrated Sensing and Communication for Binary-Modulated Input Additive White Gaussian Noise Channels,” in Proc. of IEEE 3rd International Symposium on Joint Communications & Sensing, Seefeld, Austria, Mar. 2023, pp. 1–6.
  10. Z. J. Zhang, M. Bloch, and M. Saeedifard, “Load Redistribution Attacks in Multi-Terminal DC Grids,” in Proc. of IEEE Energy Conversion Congress and Exposition, Detroit, MI, Oct. 2022.
  11. M.-C. Chang, S.-Y. Wang, and M. R. Bloch, “Controlled Sensing with Corrupted Commands,” in Proc. of 58th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sep. 2022.
  12. R. Chou and M. R. Bloch, “Commitment over Multiple-Access Channels,” in Proc. of 58th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sep. 2022.
  13. S.-Y. Wang, T. Erdoğan, U. Pereg, and M. R. Bloch, “Joint Quantum Communication and Sensing,” in Proc. of IEEE Information Theory Workshop, Aug. 2022, pp. 506–511.
  14. M.-C. Chang and M. R. Bloch, “Covert Best Arm Identification of Stochastic Bandits,” in Proc. of IEEE International Symposium on Information Theory, Helsinki, Finland, Jun. 2022, pp. 324–329.
  15. O. Günlü, M. R. Bloch, R. Schaefer, and A. Yener, “Secure Joint Communication and Sensing,” in Proc. of IEEE International Symposium on Information Theory, Helskinki, Finland, Jun. 2022, pp. 844–849.
  16. H. Zivari-Fard, M. R. Bloch, and A. Nosratinia, “Covert Communication in the Presence of an Uninformed, Informed, and Coordinated Jammer,” in Proc. of IEEE International Symposium on Information Theory, Helsinki, Finland, Jun. 2022.
  17. S.-Y. Wang, T. Erdoğan, and M. R. Bloch, “Towards a Characterization of the Covert Capacity of Bosonic Channels under Trace Distance,” in Proc. of IEEE International Symposium on Information Theory, Helsinki, Finland, Jun. 2022, pp. 354–359.
  18. M.-C. Chang, T. Erdoğan, S.-Y. Wang, and M. R. Bloch, “Rate and Detection Error-Exponent Tradeoffs of Joint Communication and Sensing,” in Proc. of IEEE International Symposium on Joint Communications & Sensing, Vienna, Austria, Mar. 2022, pp. 1–6.
  19. M. E. Cao, M. Bloch, and S. Coogan, “Estimating High Probability Reachable Sets using Gaussian Processes,” in Proc. of IEEE Conference on Decision and Control, Dec. 2021.
  20. M.-C. Chang and M. R. Bloch, “Covert Sequential Hypothesis Testing,” in Proc. of IEEE Information Theory Workshop, Oct. 2021, pp. 1–6.
  21. U. Pereg, R. Ferrara, and M. R. Bloch, “Key Assistance, Key Agreement, and Layered Secrecy for Bosonic Broadcast Channels,” in Proc. of IEEE Information Theory Workshop, Oct. 2021, pp. 1–6.
  22. M. Tahmasbi, B. Bash, S. Guha, and M. R. Bloch, “Signaling for Covert Quantum Sensing,” in Proc. of IEEE International Symposium on Information Theory, Jul. 2021, pp. 1041–1045.
  23. O. Günlü, M. Bloch, and R. F. Schaefer, “Secure Multi-Function Computation with Private Remote Sources,” in Proc. of IEEE International Symposium on Information Theory, Jul. 2021, pp. 1403–1408.
  24. S.-Y. Wang and M. R. Bloch, “Explicit Design of Provably Covert Channel Codes,” in Proc. of IEEE International Symposium on Information Theory, Jul. 2021, pp. 190–195.
  25. H. ZivariFard, M. R. Bloch, and A. Nosratinia, “Covert Communication via Non-Causal Cribbing from a Cooperative Jammer,” in Proc. of IEEE International Symposium on Information Theory, Jul. 2021, pp. 202–207.
  26. M.-C. Chang and M. R. Bloch, “Covert Authentication Against a Myopic Adversary,” in Proc. of IEEE International Symposium on Information Theory, Jul. 2021, pp. 196–201.
  27. N. Blinn, J. Boerger, and M. R. Bloch, “mmWave Beam Steering with Hierarchical Optimal Sampling for Unimodal Bandits,” in IEEE International Conference on Communications, Jun. 2021, pp. 1–6.
  28. G. Canal, M. R. Bloch, and C. Rozell, “Feedback Coding for Active Learning,” in Proc. of The 24th International Conference on Artificial Intelligence and Statistics, Jan. 2021, vol. 130, pp. 1468–1476.
  29. H. Zivari-Fard, M. Bloch, and A. Nosratinia, “Keyless Covert Communication in the Presence of Channel State Information,” in Proc. of IEEE International Symposium on Information Theory, Los Angeles, CA, Jun. 2020, pp. 834–839.
  30. S.-Y. Wang and M. R. Bloch, “Covert MIMO Communications under Variational Distance Constraint,” in Proc. of IEEE International Symposium on Information Theory, Los Angeles, CA, Jun. 2020, pp. 828–833.
  31. N. Helal, M. Bloch, and A. Nosratinia, “Resolvability of the Multiple Access Channel with Two-Sided Cooperation,” in Proc. of IEEE International Symposium on Information Theory, Los Angeles, CA, Jun. 2020.
  32. M.-C. Chang and M. Bloch, “Evasive Active Hypothesis Testing,” in Proc. of IEEE International Symposium on Information Theory, Los Angeles, CA, Jun. 2020, pp. 1248–1253.
  33. M. Tahmasbi and M. R. Bloch, “Active Covert Sensing,” in Proc. of IEEE International Symposium on Information Theory, Los Angeles, CA, Jun. 2020, pp. 840–845.
  34. A. Benevento, M. Santos, G. Notarstefano, K. Paynabar, M. Bloch, and M. Egerstedt, “Multi-Robot Coordination for Estimation and Coverage of Unknown Spatial Fields,” in Proc. of IEEE International Conference on Robotics and Automation, Paris, France, May 2020, pp. 7740–7746.
  35. M. Tahmasbi and M. R. Bloch, “Covert Communication with Unknown Code at the Warden,” in Proc. of Allerton Conference on Communication, Control and Computing, Monticello, IL, Sep. 2019, pp. 1060–1067.
  36. H. Zivari-Fard, M. Bloch, and A. Nosratinia, “Keyless Covert Communication in the Presence of Non-causal Channel State Information,” in Proc. of IEEE Information Theory Workshop, Visby, Sweden, Aug. 2019, pp. 1–5.
  37. N. Helal, M. R. Bloch, and A. Nostratinia, “Channel Resolvability with a Full-Duplex Decode-and-Forward Relay,” in Proc. of IEEE Information Theory Workshop, Visby, Sweden, Aug. 2019, pp. 1–5.
  38. I. A. Kadampot, M. Tahmasbi, and M. R. Bloch, “Forward Reconciliation for Covert Key Generation,” in Proc. of IEEE Information Theory Workshop, Visby, Sweden, Aug. 2019, pp. 1–5.
  39. M. Tahmasbi, M. Bloch, and A. Yener, “In-Band Sensing of the Adversary’s Channel for Secure Communication in Wireless Channels,” in Proc. of IEEE International Symposium on Information Theory, Paris, France, Jul. 2019, pp. 2184–2188.
  40. I. A. Kadampot, M. Tahmasbi, and M. R. Bloch, “Codes for Covert Communication over Additive White Gaussian Noise Channels,” in Proc. of IEEE International Symposium on Information Theory, Paris, France, Jul. 2019, pp. 977–981.
  41. W. Harrison and M. R. Bloch, “Attributes of Generator Matrices for Best Finite Blocklength Wiretap Codes,” in Proc. of IEEE International Symposium on Information Theory, Paris, France, Jul. 2019, pp. 827–831.
  42. M. Tahmasbi and M. Bloch, “Steganography Protocols for Quantum Channels,” in Proc. of IEEE International Symposium on Information Theory, Paris, France, Jul. 2019, pp. 2179–2183.
  43. Q. Zhang, M. Bloch, M. Bakshi, and S. Jaggi, “Undetectable Radios: Covert Communication under Spectral Mask Constraints,” in Proc. of IEEE International Symposium on Information Theory, Paris, France, Jul. 2019, pp. 992–996.
  44. G. Cervia, L. Luzzi, M. Le Treust, and M. R. Bloch, “Strong coordination over noisy channels with strictly causal encoding,” in Proc. of 56th Annual Allerton Conference on Communication, Control, and Computing, Oct. 2018, pp. 519–526.
  45. W. K. Harrison and M. R. Bloch, “On Dual Relationships of Secrecy Codes,” in Proc. of 56th Annual Allerton Conference on Communication, Control, and Computing, Oct. 2018, pp. 366–372.
  46. N. Helal, M. R. Bloch, and A. Nosratinia, “Multiple-Access Channel Resolvability with Cribbing,” in Proc. of IEEE International Symposium on Information Theory, Vail, CO, Jun. 2018, pp. 2052–2056.
  47. K. S. K. Arumugam, M. R. Bloch, and L. Wang, “Covert Communication over a Physically Degraded Relay Channel with Non-Colluding Wardens,” in Proc. of IEEE International Symposium on Information Theory, Vail, CO, Jun. 2018, pp. 766–770.
  48. I. A. Kadampot, M. Tahmasbi, and M. R. Bloch, “Multilevel-Coded Pulse Position Modulation for Covert Communications,” in Proc. of IEEE International Symposium on Information Theory, Vail, CO, Jun. 2018, pp. 1864–1868.
  49. M. Tahmasbi, M. R. Bloch, and V. F. Tan, “Error exponents covert communications,” in Proc. of IEEE Information Theory Workshop, Kaohsiung, Taiwan, Nov. 2017, pp. 304–308.
  50. K. S. K. Arumugam and M. R. Bloch, “Covert communication over broadcast channels,” in Proc. of IEEE Information Theory Workshop, Kaohsiung, Taiwan, Nov. 2017, pp. 299–303.
  51. M. Tahmasbi and M. R. Bloch, “Covert secret key generation,” in Proc. of IEEE Conference on Communications and Network Security, Workshop on Physical-Layer Methods for Wireless Security, Las Vegas, NV, Oct. 2017, pp. 540–544.
  52. E. Shipilova, J.-L. Boelle, M. Bloch, M. Barret, and J.-L. Collette, “Matrioshka orthogonal matching pursuit for blended seismic source separation,” in Proc. of SEG International Exposition and Annual Meeting, Houston, TX, Sep. 2017.
  53. H. Zivari-Fard, M. Bloch, and A. Nosratinia, “Two-Transmitter Two-Receiver Channel with Confidential Messages,” in Proc. of Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sep. 2017.
  54. M. Tahmasbi, M. R. Bloch, and A. Yener, “Learning Adversary’s Actions for Secret Communication,” in Proc. of IEEE International Symposium on Information Theory, Aachen, Germany, Jun. 2017, pp. 2713–2717.
  55. M. R. Bloch and S. Guha, “Optimal Covert Communications using Pulse-Position Modulation,” in Proc. of IEEE International Symposium on Information Theory, Aachen, Germany, Jun. 2017, pp. 2835–2839.
  56. G. Cervia, L. Luzzi, M. L. Treust, and M. R. Bloch, “Strong Coordination of Signals and Actions over Noisy Channels,” in Proc. of IEEE International Symposium on Information Theory, Aachen, Germany, Jun. 2017, pp. 2845–2849.
  57. E. Shipilova, J.-L. Boelle, M. Barret, M. Bloch, and J.-L. Collette, “Separation of impulsive blended seismic sources using Orthogonal Matching Pursuit,” in 79th Annual International Conference and Exhibition EAGE, Paris, France, Jun. 2017.
  58. I. A. Kadampot and M. R. Bloch, “Coordination with Clustered Common Randomness in a Three-Terminal Line Network,” in Proc. of IEEE International Symposium on Information Theory, Aachen, Germany, Jun. 2017, pp. 1828–1832.
  59. G. Frèche, M. R. Bloch, and M. Barret, “Polar codes for covert communications over asynchronous Discrete Memoryless Channels,” in Proc. of 51st Annual Conference on Information Sciences and Systems, Baltimore, MD, Mar. 2017, pp. 1–1.
  60. K. S. K. Arumugam, I. A. Kadampot, M. Tahmasbi, S. Shah, M. Bloch, and S. Pokutta, “Modulation recognition using side information and hybrid learning,” in Proc. IEEE Int. Symp. Dynamic Spectrum Access Networks (DySPAN), Piscataway, NJ, Mar. 2017, pp. 1–2.
  61. G. Cervia, L. Luzzi, M. R. Bloch, and M. L. Treust, “Polar coding for empirical coordination of signals and actions over noisy channels,” in Proc. of IEEE Information Theory Workshop, Cambridge, United Kingdom, Sep. 2016, pp. 81–85.
  62. M. Tahmasbi and M. R. Bloch, “Second Order Asymptotics for Degraded Wiretap Channels: How Good Are Existing Codes?,” in 54th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sep. 2016, pp. 830–837.
  63. K. S. K. Arumugam and M. R. Bloch, “Keyless asynchronous covert communication,” in Proc. of IEEE Information Theory Workshop, Cambridge, United Kingdom, Sep. 2016, pp. 191–195.
  64. R. A. Chou, M. R. Bloch, and A. Yener, “Universal covertness for Discrete Memoryless Sources,” in 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, Aug. 2016, pp. 516–523.
  65. B. N. Vellambi, J. Kliewer, and M. R. Bloch, “Lossy Compression with Near-uniform Encoder Outputs,” in Proc. of IEEE International Symposium on Information Theory, Barcelona, Spain, Jul. 2016, pp. 530–534.
  66. M. Tahmasbi and M. R. Bloch, “Second-Order Asymptotics of Covert Communications over Noisy Channels,” in Proc. of IEEE International Symposium on Information Theory, Barcelona, Spain, Jul. 2016, pp. 2224–2228.
  67. K. S. K. Arumugam and M. R. Bloch, “Keyless Covert Communication over Multiple-Access Channels,” in Proc. of IEEE International Symposium on Information Theory, Barcelona, Spain, Jul. 2016, pp. 2229–2233.
  68. M. Le Treust and M. R. Bloch, “Empirical Coordination, State Masking and State Amplification: Core of the Decoder’s Knowledge,” in Proc. of IEEE International Symposium on Information Theory, Barcelona, Spain, Jul. 2016, pp. 895–899.
  69. B. N. Vellambi, J. Kliewer, and M. R. Bloch, “Strong coordination over a line when actions are Markovian,” in Proc. of Annual Conference on Information Science and Systems, Princeton, NJ, Mar. 2016, pp. 412–417.
  70. R. A. Chou and M. R. Bloch, “Using deterministic decisions for low-entropy bits in the encoding and decoding of polar codes,” in Proc. of 53rd Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sep. 2015, pp. 1380–1385.
  71. B. N. Vellambi, J. Kliewer, and M. Bloch, “Strong Coordination over Multi-hop Line Networks,” in Proc. of IEEE Information Theory Workshop, Jeju, Korea, Jul. 2015, pp. 192–196.
  72. M. R. Bloch, “A Channel Resolvability Perspective on Stealth Communications,” in Proc. of IEEE International Symposium on Information Theory, Hong Kong, Jun. 2015, pp. 2535–2539.
  73. R. A. Chou, M. R. Bloch, and J. Kliewer, “Polar Coding for Empirical and Strong Coordination via Distribution Approximation,” in Proc. of IEEE International Symposium on Information Theory, Hong Kong, Jun. 2015, pp. 1512–1516.
  74. B. N. Vellambi, M. R. Bloch, R. A. Chou, and J. Kliewer, “Lossless and Lossy Source Compression with Near-Uniform Outputs: Is Common Randomness Always Required?,” in Proc. of IEEE International Symposium on Information Theory, Hong Kong, Jun. 2015, pp. 2171–2175.
  75. R. A. Chou and M. R. Bloch, “Polar Coding for the Broadcast Channel with Confidential Messages,” in Proc. of IEEE Information Theory Workshop, Jerusalem, Israel, Apr. 2015, pp. 1–5.
  76. M. R. Bloch and J. Kliewer, “Strong Coordination over a Three-Terminal Relay Network,” in Proc. of IEEE Information Theory Workshop, Hobart, Tasmania, Nov. 2014, pp. 646–650.
  77. R. A. Chou, M. R. Bloch, and J. Kliewer, “Low-Complexity Channel Resolvability Codes for the Symmetric Multiple-Access Channel,” in Proc. of IEEE Information Theory Workshop, Hobart, Tasmania, Nov. 2014, pp. 466–470.
  78. R. A. Chou and M. R. Bloch, “Uniform Distributed Source Coding for the Multiple Access Wiretap Channel,” in Proc. of IEEE Conference on Communications and Network Security, San Francisco, CA, Oct. 2014, pp. 127–132.
  79. V. Y. F. Tan and M. R. Bloch, “Information spectrum approach to strong converse theorems for degraded wiretap channels,” in Proc. of 52nd Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sep. 2014, pp. 747–754.
  80. N. Li et al., “Ultrafast Random Bit Generation Based on the Chaotic Dynamics of a Semiconductor Laser,” in Proc. of CLEO, San Jose, CA, Jun. 2014, pp. 1–2.
  81. J. J. Boutros, V. Dedeoglu, and M. R. Bloch, “The Anti-Diversity Concept for Secure Communication on a Two-Link Compound Channel,” in Proc. of International Zurich Seminar on Communications, Zurich, Switzerland, Feb. 2014.
  82. R. A. Chou and M. R. Bloch, “Secret-Key Generation with Arbitrarily Varying Eavesdropper’s Channel,” in Proc. of Global Conference on Signal and Information Processing, Austin, TX, Sep. 2013, pp. 277–280.
  83. R. A. Chou and M. R. Bloch, “Data compression with nearly uniform ouput,” in Proc. of IEEE International Symposium on Information Theory, Istanbul, Turkey, Jul. 2013, pp. 1979–1983.
  84. C. Ling, L. Luzzi, and M. R. Bloch, “Secret key generation from Gaussian sources using lattice hashing,” in Proc. of IEEE International Symposium on Information Theory, Istanbul, Turkey, Jul. 2013, pp. 2621–2625.
  85. M. R. Bloch and J. Kliewer, “Strong coordination over a line network,” in Proc. of IEEE International Symposium on Information Theory, Istanbul, Turkey, Jul. 2013, pp. 2319–2323.
  86. A. J. Pierrot, R. A. Chou, and M. R. Bloch, “Experimental Aspects of Secret-Key Generation in Indoor Wireless Environments,” in Proc. of Signal IEEE 4th Workshop on Signal Processing Advances in Wireless Communications, Apr. 2013.
  87. R. A. Chou, M. R. Bloch, and E. Abbe, “Polar Coding for Secret-Key Generation,” in Proc. of IEEE Information Theory Workshop, Sevilla, Spain, Apr. 2013, pp. 1–5.
  88. A. J. Pierrot and M. R. Bloch, “Joint Channel Intrinsic Randomness and Channel Resolvability,” in Proc. of IEEE Information Theory Workshop, Sevilla, Spain, Apr. 2013, pp. 1–5.
  89. F. Renna et al., “Low-power secret key agreement over OFDM,” in Proc. of the 2nd ACM workshop on Hot topics on wireless network security and privacy, Budapest, Hungary, Apr. 2013, pp. 43–48.
  90. M. R. Bloch, L. Luzzi, and J. Kliewer, “Strong Coordination with Polar Codes,” in Proc. of 50th Allerton Conference on Communication, Control, and Computing, Monticello, IL, Oct. 2012, pp. 565–571.
  91. A. J. Pierrot and M. R. Bloch, “LDPC-based coded cooperative jamming codes,” in Proc. of IEEE Information Theory Workshop, Lausanne, Switzerland, Sep. 2012, pp. 462–466.
  92. M. R. Bloch and J. Kliewer, “On secure communication with constrained randomization,” in Proc. of IEEE International Symposium on Information Theory, Cambridge, MA, Jul. 2012, pp. 1172–1176.
  93. R. A. Chou and M. R. Bloch, “One-way rate-limited sequential key-distillation,” in Proc. of IEEE International Symposium on Information Theory, Cambridge, MA, Jul. 2012, pp. 1777–1781.
  94. M. R. Bloch, “Achieving Secrecy: capacity vs. Resolvability,” in Proc. of IEEE International Symposium on Information Theory, Saint Petersburg, Russia, Aug. 2011, pp. 632–636.
  95. F. Renna, M. Bloch, and N. Laurenti, “Semi-Blind Key-Agreement over MIMO Fading Channels,” in Proc. of IEEE International Conference on Communications, Kyoto, Japan, Jun. 2011, pp. 1–6.
  96. L. Luzzi and M. R. Bloch, “Capacity-based random codes cannot achieve strong secrecy over symmetric wiretap channels,” in Proc. of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, Cachan, France, May 2011, pp. 641–647.
  97. F. Renna, M. Bloch, and N. Laurenti, “Semi-Blind Key-Agreement over MIMO Quasi-Static Channels,” in Proc. of 2011 NEWCOM/COST Joint Workshop, Paris, France, Mar. 2011, pp. 1–6.
  98. A. T. Suresh, A. Subramanian, A. Thangaraj, M. Bloch, and S. McLaughlin, “Strong Secrecy for Erasure Wiretap Channels,” in Proc. of IEEE Information Theory Workshop, Dublin, Ireland, Sep. 2010.
  99. A. Subramanian, A. T. Suresh, A. Thangaraj, M. Bloch, and S. McLaughlin, “Strong and Weak Secrecy in Wiretap Channels,” in Proc. of 6th International Symposium on Turbo Codes and Iterative Information Processing, Brest, France, Sep. 2010, pp. 30–34.
  100. M. Bloch, “Channel Intrinsic Randomness,” in Proc. of IEEE International Symposium on Information Theory, Austin, TX, Jun. 2010, pp. 2607–2611.
  101. J. P. Vilela, M. Bloch, J. Barros, and S. W. McLaughlin, “Friendly Jamming for Wireless Secrecy,” in Proc. of IEEE International Conference on Communications, Cape Town, South Africa, May 2010, pp. 1550–3607.
  102. M. Rodrigues, A. Somekh-Baruch, and M. Bloch, “On Gaussian Wiretap Channels with Arbitrary Inputs,” in Proc. of European Wireless, Lucca, Italy, Apr. 2010, pp. 774–781.
  103. E. MolavianJazi, M. Bloch, and J. N. Laneman, “Arbitrary Jamming Can Preclude Secure Communications,” in Proc. 47th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sep. 2009, pp. 1069–1075.
  104. M. Bloch, “Channel Scrambling for Secrecy,” in Proc. of IEEE International Symposium on Information Theory, Seoul, Korea, Jul. 2009, pp. 2452–2456.
  105. B. P. Dunn, M. Bloch, and J. N. Laneman, “Secure bits through queues,” in Proc. of IEEE Information Theory Workshop, Volos, Greece, Jun. 2009, pp. 37–41.
  106. M. Bloch and J. N. Laneman, “Information-Spectrum Methods for Information-Theoretic Security,” in Proc. Information Theory and Applications Workshop, San Diego, CA, Feb. 2009, pp. 23–28.
  107. M. Bloch and J. N. Laneman, “On the Secrecy Capacity of Arbitrary Wiretap Channels,” in Proceedings of 46th Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sep. 2008, pp. 818–825.
  108. J. Barros and M. Bloch, “Strong Secrecy for Wireless Channels,” in Information Theoretic Security, Calgary, Canada, Aug. 2008, pp. 40–53.
  109. M. Bloch and A. Thangaraj, “Confidential Messages to a Cooperative Relay,” in Proc. of IEEE Information Theory Workshop, Porto, Portugal, May 2008, pp. 154–158.
  110. S. Fossier et al., “Quantum Key Distribution over 25 km Using a Fiber Setup Based on Continuous Variables,” in Proc. of CLEO/QELS, San Jose, CA, May 2008, pp. 1–2.
  111. M. Bloch, R. Narasimha, and S. W. McLaughlin, “Client-Server Architecture Design based on Wiretap Codes,” in Proc of the 2008 International Zurich Seminar on Communications, Zurich, Switzerland, Mar. 2008, pp. 44–47.
  112. E. Diamanti et al., “Implementation of an all-fiber continuous variables quantum key distribution system,” in International Conference on Quantum Information Processing and Communication, Barcelona, Spain, Oct. 2007.
  113. M. Bloch, J. Barros, and S. W. McLaughlin, “Practical Information-Theoretic Commitment,” in Proc. 45th Allerton Conference on Communication Control and Computing, Monticello, IL, Sep. 2007, pp. 1035–1039.
  114. J. Lodewyck et al., “Quantum key distribution device with coherent states,” in Proc. of SPIE Optics East, Boston, MA, USA, Sep. 2007, vol. 6780, pp. 67800Z/1–14.
  115. J. Lodewyck et al., “Distribution quantique de clé a 25 km au moyen d’un dispositif fibré utilisant des variables continues,” in 10eme Colloque sur les Lasers et l’Optique Quantique, Grenoble, France, Jul. 2007.
  116. S. Kaimalettu, A. Thangaraj, M. Bloch, and S. W. McLaughlin, “Constellation Shaping using LDPC Codes,” in Proc. of IEEE International Symposium on Information Theory, Nice, France, Jun. 2007, pp. 2366–2370.
  117. M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, “Information Theoretic Security for Wireless Channels - Theory and Practice,” in Proc. 2007 Information Theory and Application Workshop, San Diego, CA, USA, Feb. 2007.
  118. M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, “LDPC-based Secure Wireless Communication with Imperfect Knowledge of the Eavesdropper’s Channels,” in Proc. of IEEE Information Theory Workshop, Chengdu, China, Oct. 2006, pp. 155–159.
  119. M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, “An Opportunistic Physical-Layer Approach to Secure Wireless Communications,” in Proc. 44th Allerton Conference on Communication Control and Computing, Monticello, IL, Sep. 2006, pp. 849–854.
  120. S. Donnet, A. Thangaraj, M. Bloch, J. Cussey, J.-M. Merolla, and L. Larger, “Cryptanalysis of Y-00 under Heterodyne Measurement and Fast Correlation Attack,” in Proc. European Conference on Optical Communication, Cannes, France, Sep. 2006, pp. 1–2.
  121. M. Bloch, A. Thangaraj, S. W. McLaughlin, and J.-M. Merolla, “LDPC-based Secret Key Agreement over the Gaussian wiretap channel,” in Proc. of IEEE International Symposium on Information Theory, Seattle, USA, Jul. 2006, pp. 1179–1183.
  122. M. Bloch, A. Thangaraj, S. W. McLaughlin, and J.-M. Merolla, “LDPC-based Gaussian Key Reconciliation,” in Proc. of IEEE Information Theory Workshop, Punta del Este, Uruguay, Mar. 2006, pp. 116–120.
  123. J. Cussey, M. Bloch, A. Thangaraj, J.-M. Merolla, and S. W. McLaughlin, “Integrated Direct-Modulation Based Quantum Cryptography System,” in Proc. Optical Network and Technologies, Pisa, Italy, Oct. 2004, pp. 390–395.
  124. J. Cussey, M. Bloch, A. Thangaraj, J.-M. Merolla, and S. W. McLaughlin, “Direct-Modulation Scheme for Free-Space Quantum Cryptography,” in Proc. European Conference on Optical Communication, Stockholm, Sweden, Sep. 2004.