Hoppa till huvudinnehållet
Till KTH:s startsida Till KTH:s startsida

Publikationer av Tobias Oechtering

Refereegranskade

Artiklar

[1]
R. R. Avula, T. J. Oechtering och D. Månsson, "Adversarial Inference Control in Cyber-Physical Systems : A Bayesian Approach With Application to Smart Meters," IEEE Access, vol. 12, s. 24933-24948, 2024.
[2]
Y. You, Z. Li och T. J. Oechtering, "Non-Cooperative Games for Privacy-Preserving and Cost-Efficient Smart Grid Energy Management," IEEE Transactions on Information Forensics and Security, vol. 18, s. 423-434, 2023.
[3]
S. Saeidian et al., "Pointwise Maximal Leakage," IEEE Transactions on Information Theory, vol. 69, no. 12, s. 8054-8080, 2023.
[4]
Y. You och T. J. Oechtering, "Time-adaptive Expectation MaximizationLearning Framework for HMM basedData-driven Gas Sensor Calibration," IEEE Transactions on Industrial Informatics, vol. 19, no. 7, s. 7986-7994, 2023.
[5]
A. Zamani, T. J. Oechtering och M. Skoglund, "Data Disclosure With Non-Zero Leakage and Non-Invertible Leakage Matrix," IEEE Transactions on Information Forensics and Security, vol. 17, s. 165-179, 2022.
[6]
Y. You et al., "On Data-Driven Self-Calibration for IoT-Based Gas Concentration Monitoring Systems," IEEE Internet of Things Journal, s. 1-1, 2022.
[7]
A. Zamanisiboni, T. J. Oechtering och M. Skoglund, "A Design Framework for Strongly chi(2)-Private Data Disclosure," IEEE Transactions on Information Forensics and Security, vol. 16, s. 2312-2325, 2021.
[8]
R. R. Avula et al., "Design Framework for Privacy-Aware Demand-Side Management with Realistic Energy Storage Model," IEEE Transactions on Smart Grid, vol. 12, no. 4, s. 3503-3513, 2021.
[9]
Y. You, Z. Li och T. J. Oechtering, "Energy Management Strategy for Smart Meter Privacy and Cost Saving," IEEE Transactions on Information Forensics and Security, vol. 16, s. 1522-1537, 2021.
[10]
L. Zhou, T. J. Oechtering och M. Skoglund, "Fundamental Limits-Achieving Polar Code Designs for Biometric Identification and Authentication," IEEE Transactions on Information Forensics and Security, s. 1-1, 2021.
[11]
M. T. Vu, T. J. Oechtering och M. Skoglund, "Hypothesis Testing and Identification Systems," IEEE Transactions on Information Theory, vol. 67, no. 6, s. 3765-3780, 2021.
[12]
J. P. Champati et al., "Minimum Achievable Peak Age of Information Under Service Preemptions and Request Delay," IEEE Journal on Selected Areas in Communications, vol. 39, no. 5, s. 1365-1379, 2021.
[13]
L. Zhou et al., "Privacy-Preserving Identification Systems With Noisy Enrollment," IEEE Transactions on Information Forensics and Security, vol. 16, s. 3510-3523, 2021.
[14]
S. Saeidian et al., "Quantifying Membership Privacy via Information Leakage," IEEE Transactions on Information Forensics and Security, vol. 16, s. 3096-3108, 2021.
[15]
H. Ghourchian et al., "Secure Block Source Coding With Sequential Encoding," IEEE Journal on Selected Areas in Information Theory, vol. 2, no. 1, 2021.
[16]
L. Zhou et al., "Two-Stage Biometric Identification Systems without Privacy Leakage," IEEE Journal on Selected Areas in Information Theory, 2021.
[17]
M. T. Vu et al., "Uncertainty in Identification Systems," IEEE Transactions on Information Theory, vol. 67, no. 3, s. 1400-1414, 2021.
[18]
P. Cao och T. J. Oechtering, "Optimal Transmit Strategies for Gaussian MISO Wiretap Channels," IEEE Transactions on Information Forensics and Security, vol. 15, s. 829-838, 2020.
[19]
M. T. Vu, T. J. Oechtering och M. Skoglund, "Hierarchical Identification with Pre-processing," IEEE Transactions on Information Theory, vol. 66, no. 1, s. 82-113, 2019.
[20]
Z. Li, T. J. Oechtering och D. Gunduz, "Privacy Against a Hypothesis Testing Adversary," IEEE Transactions on Information Forensics and Security, vol. 14, no. 6, s. 1567-1581, 2019.
[21]
M. Wiese et al., "Secure Estimation and Zero-Error Secrecy Capacity," IEEE Transactions on Automatic Control, vol. 64, no. 3, s. 1047-1062, 2019.
[22]
R. Mochaourab och T. J. Oechtering, "Private Filtering for Hidden Markov Models," IEEE Signal Processing Letters, vol. 25, no. 6, s. 888-892, 2018.
[23]
L. P. Cao, T. J. Oechtering och M. Skoglund, "Transmit Beamforming for Single-User Large-Scale MISO Systems With Sub-Connected Architecture and Power Constraints," IEEE Communications Letters, vol. 22, no. 10, s. 2096-2099, 2018.
[24]
H. T. Do et al., "Interfering Relay Channels," Entropy, vol. 19, no. 9, 2017.
[25]
T. T. Do et al., "Massive MIMO Pilot Retransmission Strategies for Robustification Against Jamming," IEEE Wireless Communications Letters, vol. 6, no. 1, s. 58-61, 2017.
[26]
Z. Li och T. Oechtering, "Privacy-Constrained Parallel Distributed Neyman-Pearson Test," IEEE Transactions on Signal and Information Processing over Networks, vol. 3, no. 1, s. 77-90, 2017.
[27]
T. T. Do et al., "Uplink Waveform Channel With Imperfect Channel State Information and Finite Constellation Input," IEEE Transactions on Wireless Communications, vol. 16, no. 2, s. 1107-1119, 2017.
[28]
A. A. Zaidi et al., "On the tightness of linear policies for stabilization of linear systems over Gaussian networks," Systems & control letters (Print), vol. 88, s. 32-38, 2016.
[29]
[30]
K. Kittichokechai et al., "Secure Source Coding With a Public Helper," IEEE Transactions on Information Theory, vol. 62, no. 7, s. 3930-3949, 2016.
[31]
K. Kittichokechai, T. J. Oechtering och M. Skoglund, "Coding With Action-Dependent Side Information and Additional Reconstruction Requirements," IEEE Transactions on Information Theory, vol. 61, no. 11, s. 6355-6367, 2015.
[32]
O. Goubet et al., "Low-Complexity Scalable Iterative Algorithms for IEEE 802.11p Receivers," IEEE Transactions on Vehicular Technology, vol. 64, no. 9, s. 3944-3956, 2015.
[33]
S. M. Kim et al., "On the Entropy Computation of Large Complex Gaussian Mixture Distributions," IEEE Transactions on Signal Processing, vol. 63, no. 17, s. 4710-4723, 2015.
[34]
Z. Li och T. Oechtering, "Privacy-Aware Distributed Bayesian Detection," IEEE Journal on Selected Topics in Signal Processing, vol. 9, no. 7, s. 1345-1357, 2015.
[35]
K. Kittichokechai et al., "Secure Source Coding With Action-Dependent Side Information," IEEE Transactions on Information Theory, vol. 61, no. 12, s. 6444-6464, 2015.
[36]
T. T. Do et al., "Waveform domain framework for capacity analysis of uplink WCDMA systems," EURASIP Journal on Wireless Communications and Networking, 2015.
[37]
H. T. Do, T. J. Oechtering och M. Skoglund, "Layered Coding for the Interference Channel With a Relay," IEEE Transactions on Information Theory, vol. 60, no. 10, s. 6154-6180, 2014.
[38]
R. Timo, T. J. Oechtering och M. Wigger, "Source Coding Problems With Conditionally Less Noisy Side Information," IEEE Transactions on Information Theory, vol. 60, no. 9, s. 5516-5532, 2014.
[39]
A. A. Zaidi et al., "Stabilization of Linear Systems Over Gaussian Networks," IEEE Transactions on Automatic Control, vol. 59, no. 9, s. 2369-2384, 2014.
[40]
T. J. Oechtering och M. Skoglund, "Bidirectional Broadcast Channel With Random States Noncausally Known at the Encoder," IEEE Transactions on Information Theory, vol. 59, no. 1, s. 64-75, 2013.
[41]
H. Do, T. Oechtering och M. Skoglund, "On Asymmetric Interference Channels with Cooperating Receivers," IEEE Transactions on Communications, vol. 61, no. 2, s. 554-563, 2013.
[42]
A. A. Zaidi et al., "On optimal policies for control and estimation over a Gaussian relay channel," Automatica, vol. 49, no. 9, s. 2892-2897, 2013.
[43]
T. T. Do, T. J. Oechtering och M. Skoglund, "Optimal Transmission for the MIMO Bidirectional Broadcast Channel in the Wideband Regime," IEEE Transactions on Signal Processing, vol. 61, no. 20, s. 5103-5116, 2013.
[44]
M. Andersson et al., "Polar Coding for Bidirectional Broadcast Channels with Common and Confidential Messages," IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, s. 1901-1908, 2013.
[45]
R. F. Wyrembelski, T. J. Oechtering och H. Boche, "MIMO Gaussian Bidirectional Broadcast Channels with Common Messages," IEEE Transactions on Wireless Communications, vol. 10, no. 9, s. 2950-2959, 2011.
[46]
R. F. Wyrembelski et al., "Optimal Coding Strategies for Bidirectional Broadcast Channels Under Channel Uncertainty," IEEE Transactions on Communications, vol. 58, no. 10, s. 2984-2994, 2010.
[47]
T. J. Oechtering, R. F. Wyrembelski och H. Boche, "Multiantenna Bidirectional Broadcast Channels-Optimal Transmit Strategies," IEEE Transactions on Signal Processing, vol. 57, no. 5, s. 1948-1958, 2009.
[48]
T. J. Oechtering et al., "On the Optimal Transmit Strategy for the MIMO Bidirectional Broadcast Channel," IEEE Transactions on Communications, vol. 57, no. 12, s. 3817-3826, 2009.
[49]
T. J. Oechtering och H. Boche, "Bidirectional regenerative half-duplex relaying using relay selection," IEEE Transactions on Wireless Communications, vol. 7, no. 5, s. 1879-1888, 2008.
[50]
T. J. Oechtering et al., "Broadcast capacity region of two-phase bidirectional relaying," IEEE Transactions on Information Theory, vol. 54, no. 1, s. 454-458, 2008.
[51]
A. Sezgin och T. J. Oechtering, "Complete characterization of the equivalent MIMO channel for quasi-orthogonal space-time codes," IEEE Transactions on Information Theory, vol. 54, no. 7, s. 3315-3327, 2008.
[52]
T. J. Oechtering och H. Boche, "Optimal time-division for bidirectional relaying using superposition encoding," IEEE Communications Letters, vol. 12, no. 4, s. 265-267, 2008.
[53]
T. J. Oechtering och H. Boche, "Piggyback a common message on half-duplex bidirectional relaying," IEEE Transactions on Wireless Communications, vol. 7, no. 9, s. 3397-3406, 2008.
[54]
T. J. Oechtering och H. Boche, "Stability region of an optimized bidirectional regenerative half-duplex relaying protocol," IEEE Transactions on Communications, vol. 56, no. 9, s. 1519-1529, 2008.
[55]
C. M. Walke och T. J. Oechtering, "Analytical expression for uplink C/I-distribution in interference-limited cellular radio systems," Electronics Letters, vol. 38, no. 14, s. 743-744, 2002.

Konferensbidrag

[56]
A. Zamani et al., "Cache-Aided Private Variable-Length Coding with Zero and Non-Zero Leakage," i 2023 21st International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2023, 2023, s. 247-254.
[57]
A. Zamani, T. J. Oechtering och M. Skoglund, "Multi-User Privacy Mechanism Design with Non-zero Leakage," i 2023 IEEE Information Theory Workshop, ITW 2023, 2023, s. 401-405.
[58]
Y. Chen et al., "On Strong Secrecy for Multiple Access Channel with States and causal CSI," i 2023 IEEE International Symposium on Information Theory, ISIT 2023, 2023, s. 2744-2749.
[59]
S. Saeidian et al., "Pointwise Maximal Leakage on General Alphabets," i 2023 IEEE International Symposium on Information Theory, ISIT 2023, 2023, s. 388-393.
[60]
A. Zamani, T. J. Oechtering och M. Skoglund, "Private Variable-Length Coding with Non-Zero Leakage," i WIFS 2023 - IEEE Workshop on Information Forensics and Security, 2023.
[61]
A. Zamani et al., "Private Variable-Length Coding with Zero Leakage," i WIFS 2023 - IEEE Workshop on Information Forensics and Security, 2023.
[62]
H. Ghourchian, T. J. Oechtering och M. Skoglund, "Secure Block Joint Source-Channel Coding with Sequential Encoding," i 2023 IEEE International Symposium on Information Theory, ISIT 2023, 2023, s. 2732-2737.
[63]
A. Gouverneur et al., "Thompson Sampling Regret Bounds for Contextual Bandits with sub-Gaussian rewards," i 2023 IEEE International Symposium on Information Theory, ISIT 2023, 2023, s. 1306-1311.
[64]
A. Gouverneur et al., "An Information-Theoretic Analysis of Bayesian Reinforcement Learning," i 2022 58Th Annual Allerton Conference On Communication, Control, And Computing (ALLERTON), 2022.
[65]
A. Zamani, T. J. Oechtering och M. Skoglund, "Bounds for Privacy-Utility Trade-off with Non-zero Leakage," i IEEE International Symposium on Information Theory - Proceedings, 2022, s. 620-625.
[66]
A. Zamani, T. J. Oechtering och M. Skoglund, "Bounds for Privacy-Utility Trade-off with Per-letter Privacy Constraints and Non-zero Leakage," i 2022 IEEE INFORMATION THEORY WORKSHOP (ITW), 2022, s. 13-18.
[67]
S. Saeidian et al., "Pointwise Maximal Leakage," i IEEE International Symposium on Information Theory - Proceedings, 2022, s. 626-631.
[68]
R. R. Avula och T. J. Oechtering, "Privacy-Enhancing Appliance Filtering For Smart Meters," i International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2022.
[69]
D. Fay, J. Sjölund och T. J. Oechtering, "Private Learning via Knowledge Transfer with High-Dimensional Targets," i 2022 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2022, s. 3873-3877.
[70]
Y. Bao, L. Zhou och T. J. Oechtering, "Proof-of-Concept of Polar Codes for Biometric Identification and Authentication," i 2022 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2022.
[71]
L. Zhou, T. J. Oechtering och M. Skoglund, "Uncertainty in Biometric Identification and Authentication Systems with Strong Secrecy," i 2022 58th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 27-30 September 2022, 2022.
[72]
G. Cervia, T. J. Oechtering och M. Skoglund, "(epsilon, n) Fixed-Length Strong Coordination Capacity," i 2021 IEEE Information Theory Workshop (ITW), 2021.
[73]
M. Le Treust och T. J. Oechtering, "Continuous Random Variable Estimation is not Optimal for the Witsenhausen Counterexample," i 2021 IEEE International Symposium on Information Theory (ISIT), 2021, s. 1889-1894.
[74]
L. Zhou, T. J. Oechtering och M. Skoglund, "Incremental Design of Secure Biometric Identification and Authentication," i 2021 IEEE International Symposium on Information Theory (ISIT), 2021.
[75]
S. Saeidian et al., "Optimal Maximal Leakage-Distortion Tradeoff," i 2021 IEEE Information Theory Workshop, ITW 2021 - Proceedings, 2021.
[76]
L. Zhou, T. J. Oechtering och M. Skoglund, "Polar Codes for Biometric Identification and Authentication," i 2021 IEEE Information Theory Workshop, ITW 2021 - Proceedings, 2021.
[77]
H. Ghourchian et al., "Secure Source Coding with Side-information at Decoder and Shared Key at Encoder and Decoder," i 2021 IEEE Information Theory Workshop, ITW 2021 - Proceedings, 2021.
[78]
Y. You, A. Xu och T. J. Oechtering, "Belief Function Fusion based Self-calibration for Non-dispersive Infrared Gas Sensor," i IEEE Sensors Conference, 2020, s. 1-4.
[79]
A. Zamani, T. J. Oechtering och M. Skoglund, "Data Disclosure Mechanism Design with Non-zero Leakage," i 2020 IEEE Information Theory Workshop (ITW), 2020.
[80]
Y. You och T. J. Oechtering, "Hidden Markov Model Based Data-driven Calibration of Non-dispersive Infrared Gas Sensor," i 28TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO 2020), 2020, s. 1717-1721.
[81]
Y. You och T. J. Oechtering, "Hidden Markov Model Based Data-driven Calibration of Nondispersive Infrared Gas Sensor," i Proceedings of EUSIPCO 2020, 2020, s. 1717-1721.
[82]
R. R. Avula och T. J. Oechtering, "On design of optimal smart meter privacy control strategy against adversarial MAP detection," i Proceedings of the ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2020, s. 5845-5849.
[83]
J. P. Champati et al., "On the Minimum Achievable Age of Information for General Service-Time Distributions," i Proceedings 39th IEEE Conference on Computer Communications, INFOCOM 2020, 2020.
[84]
Y. You och T. J. Oechtering, "Online Energy Management Strategy Design for Smart Meter Privacy Against FHMM-based NILM," i 2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), 2020.
[85]
R. R. Avula och T. J. Oechtering, "Optimal privacy-by-design strategy for user demand shaping in smart grids," i Proceedings of the 2020 IEEE Power & Energy Society Innovative Smart Grid Technologies, 2020.
[86]
G. Cervia, T. J. Oechtering och M. Skoglund, "Remote Joint Strong Coordination and Reliable Communication," i 2020 IEEE International Symposium on Information Theory (ISIT), 2020.
[87]
H. Ghourchian et al., "Block Source Coding with Sequential Encoding," i 2019 IEEE Information Theory Workshop, ITW 2019, 2019.
[88]
T. J. Oechtering och M. L. Treust, "Coordination Coding with Causal Decoder for Vector-valued Witsenhausen Counterexample Setups," i 2019 IEEE Information Theory Workshop, ITW 2019, 2019, s. 309-313.
[89]
G. Cervia, T. J. Oechtering och M. Skoglund, "Fixed-Length Strong Coordination," i 2019 IEEE Information Theory Workshop, ITW 2019, 2019.
[90]
L. Zhou et al., "Fundamental Limits for Biometric Identification Systems without Privacy Leakage," i Proceedings 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2019.
[91]
M. T. Vu, T. J. Oechtering och M. Skoglund, "Operational Equivalence of Distributed Hypothesis Testing and Identification Systems," i Proceedings 2019 IEEE International Symposium on Information Theory (ISIT), 2019, s. 1999-2003.
[92]
M. L. Treust och T. J. Oechtering, "Optimal Control Designs for Vector-valued Witsenhausen Counterexample Setups," i 2018 56th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2018, 2019, s. 532-537.
[93]
L. Zhou, M. T. Vu och T. J. Oechtering, "Polar Codes for Identification Systems," i Proceedings of the 12th International ITG Conference on Systems, Communications and Coding, 2019.
[94]
Z. Li och T. J. Oechtering, "Privacy-utility management of hypothesis tests," i 2018 IEEE Information Theory Workshop, ITW 2018, 2019.
[95]
R. R. Avula et al., "Smart Meter Privacy Control Strategy Including Energy Storage Degradation," i 2019 IEEE Milan PowerTech, 2019.
[96]
M. T. Vu, T. J. Oechtering och M. Skoglund, "Gaussian hierarchical identification with pre-processing," i Data Compression Conference Proceedings, 2018, s. 277-286.
[97]
Y. You, Z. Li och T. J. Oechtering, "Optimal Privacy-Enhancing and Cost-Efficient Energy Management Strategies for Smart Grid Consumers," i 2018 IEEE Statistical Signal Processing Workshop, SSP 2018, 2018, s. 144-148.
[98]
P. Cao, T. J. Oechtering och M. Skoglund, "Precoding Design for Massive MIMO Systems with Sub-connected Architecture and Per-antenna Power Constraints," i WSA 2018 - 22nd International ITG Workshop on Smart Antennas2018 22nd International ITG Workshop on Smart Antennas, WSA 2018, Bochum, 14-16 March 2018, 2018.
[99]
R. R. Avula, T. J. Oechtering och D. Månsson, "Privacy-preserving smart meter control strategy including energy storage losses," i Proceedings - 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe, ISGT-Europe 2018, 2018.
[100]
M. T. Vu, T. J. Oechtering och M. Skoglund, "Testing in Identification Systems," i 2018 IEEE INFORMATION THEORY WORKSHOP (ITW), 2018, s. 295-299.
[101]
M. T. Vu et al., "Uncertainty in Identification Systems," i IEEE International Symposium on Information Theory - Proceedings, 2018, s. 2386-2390.
[102]
V. Moles-Cases et al., "A Comparison of OFDM, QAM-FBMC, and OQAM-FBMC Waveforms Subject to Phase Noise," i 2017 IEEE International Conference on Communications  (ICC), 2017.
[103]
M. T. Vu, T. J. Oechtering och M. Skoglund, "Hierarchical identification with pre-processing," i 2017 IEEE International Symposium on Information Theory (ISIT), 2017, s. 2746-2750.
[104]
P. Cao och T. Oechtering, "Optimal Trade-off Between Transmission Rate andSecrecy Rate in Gaussian MISO Wiretap Channels," i The 21st International ITG Workshop on Smart Antennas (WSA 2017), 2017.
[105]
L. P. Cao och T. J. Oechtering, "Optimal transmit strategy for MIMO channels with joint sum and per-antenna power constraints," i 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2017, s. 3569-3573.
[106]
M. T. Vu, T. J. Oechtering och M. Skoglund, "Polar code for secure Wyner-Ziv coding," i 8th IEEE International Workshop on Information Forensics and Security, WIFS 2016, 2017.
[107]
M. Wiese och T. J. Oechtering, "Secure distributed estimation of linear systems," i 2016 IEEE Conference on Communications and Network Security, CNS 2016, 2017, s. 616-620.
[108]
Z. Li, T. Oechtering och D. Gunduz, "Smart Meter Privacy Based on Adversarial Hypothesis Testing," i Proceedings of the IEEE International Symposium on Information Theory (ISIT) 2017, 2017, s. 774-778.
[109]
M. T. Vu et al., "Successive refinement with cribbing and side information," i 54th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2016, 2017, s. 70-77.
[110]
P. Cao, T. Oechtering och S. Mikael, "Optimal Transmission with Per-antenna Power Constraints for Multiantenna Bidirectional Broadcast Channels," i The Ninth IEEE Sensor Array and Multichannel Signal Processing Workshop, 2016.
[111]
Z. Li, T. Oechtering och M. Skoglund, "Privacy-Preserving Energy Flow Control in Smart Grids," i Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP) 2016, 2016.
[112]
T. Tanaka et al., "Rate of prefix-free codes in LQG control systems," i 2016 IEEE International Symposium on Information Theory - Proceedings, 2016, s. 2399-2403.
[113]
M. Wiese et al., "Secure Estimation for Unstable Systems," i 2016 IEEE 55th Conference on Decision and Control, CDC 2016, 2016, s. 5059-5064.
[114]
M. Wiese et al., "Uncertain wiretap channels and secure estimation," i 2016 IEEE International Symposium on Information Theory, 2016, s. 2004-2008.
[115]
T. T. Do et al., "Capacity analysis of uplink WCDMA systems with imperfect channel state information," i IEEE Vehicular Technology Conference, 2015.
[116]
M. T. Vu, T. J. Oechtering och M. Skoglund, "Lossy distributed storage with limited failure loss," i Proceedings of the International Symposium on Wireless Communication Systems, 2015, s. 191-195.
[117]
P. Cao et al., "Optimal Transmission Rate for MISO Channels with Joint Sum and Per-antenna Power Constraints," i IEEE International Conference on Communications (ICC), London, June 08-12, 2015, 2015, s. 4727-4732.
[118]
Z. Li och T. Oechtering, "Privacy on Hypothesis Testing in Smart Grids," i Proceedings of the IEEE Information Theory Workshop (ITW) 2015 Jeju, 2015, s. 337-341.
[119]
[120]
Z. Li och T. Oechtering, "Differential Privacy in Parallel Distributed Bayesian Detections," i Proceedings of the 17th International Conference on Information Fusion (FUSION), 2014, s. 1-7.
[121]
K. Kittichokechai, T. J. Oechtering och M. Skoglund, "Lossy Source Coding with Reconstruction Privacy," i 2014 IEEE International Symposium on Information Theory (ISIT), 2014, s. 386-390.
[122]
Z. Li, T. Oechtering och K. Kittichokechai, "Parallel Distributed Bayesian Detection with Privacy Constraints," i Proceedings of the IEEE International Conference on Communications (ICC) 2014, 2014, s. 2178-2183.
[123]
Z. Li, T. Oechtering och J. Jaldén, "Parallel Distributed Neyman-Pearson Detection with Privacy Constraints," i Proceedings of the IEEE International Conference on Communications (ICC) 2014 Workshop, 2014, s. 765-770.
[124]
Z. Li och T. Oechtering, "Privacy-Concerned Parallel Distributed Bayesian Sequential Detection," i Proceedings of the IEEE Global Conference on Signal and Information Processing (GlobalSIP) 2014, 2014, s. 928-932.
[125]
D. Xu et al., "Secure Successive Refinement with Degraded Side Information," i 2014 IEEE International Symposium on Information Theory (ISIT), 2014, s. 2674-2678.
[126]
S. M. Kim et al., "Sphere decoding inspired approximation method to compute the entropy of large Gaussian mixture distributions," i IEEE Workshop on Statistical Signal Processing Proceedings, 2014, s. 264-267.
[127]
A. A. Zaidi et al., "Stabilization and Control over Gaussian Networks," i LCCC Workshop in Information and Control in Networks, 2014, s. 39-85.
[128]
A. A. Zaidi, T. J. Oechtering och M. Skoglund, "Stabilization of noisy plants over a Gaussian interference channel," i IWCIT 2014 - Iran Workshop on Communication and Information Theory, 2014.
[129]
Z. Li och T. Oechtering, "Tandem Distributed Bayesian Detection with Privacy Constraints," i Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP) 2014, 2014, s. 8168-8172.
[130]
I. Bilal et al., "An Optimized Linear Scheme for Stabilization Over Multi-User Gaussian Networks," i 2013 Information Theory And Applications Workshop (ITA), 2013, s. 290-297.
[131]
H. Do et al., "Capacity Region of a Class of Interfering Relay Channels," i 2013 IEEE Information Theory Workshop (ITW), 2013, s. 6691350.
[132]
M. N. Khormuji, T. J. Oechtering och M. Skoglund, "Capacity Region of the Bidirectional Broadcast Channel with Causal Channel State Information," i Proceedings of the Tenth International Symposium on Wireless Communication Systems (ISWCS 2013), 2013, s. 274-278.
[133]
J. Jaldén och T. J. Oechtering, "Distributed Bayesian detection for the butterfly network," i 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 2013, s. 61-65.
[134]
I. Bilal et al., "Feedback stabilization over a Gaussian interference relay channel," i 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications, SPAWC, 2013, s. 560-564.
[135]
H. Do et al., "Gaussian Interfering Relay Channels," i 2013 Asilomar Conference on Signals, Systems and Computers, 2013, s. 1968-1972.
[136]
A. A. Zaidi, T. J. Oechtering och M. Skoglund, "On stabilization over a Gaussian interference channel," i 2013 European Control Conference (ECC), 2013, s. 2386-2391.
[137]
R. Wyrembelski, H. Boche och T. J. Oechtering, "Robust physical layer service integration in bidirectional relay networks : Common messages," i 9th International ITG Conference on Systems, Communications and Coding, SCC 2013, 2013.
[138]
K. Kittichokechai et al., "Secure Source Coding with a Public Helper," i IEEE International Symposium on Information Theory, 2013, s. 2209-2213.
[139]
R. Timo, T. J. Oechtering och M. Wigger, "Successive refinement with conditionally less noisy side information," i IEEE International Symposium on Information Theory : Proceedings, 2013, s. 2985-2989.
[140]
H. Do, T. Oechtering och M. Skoglund, "A new inner bound for the interference relay channel," i 2012 46th Annual Conference on Information Sciences and Systems, CISS 2012, 2012, s. 6310756.
[141]
T. T. Do, T. Oechtering och M. Skoglund, "Achievable energy per bit for the multi-pair MIMO bidirectional broadcast channel," i European Wireless, 2012. EW. 18th European Wireless Conference, 2012.
[142]
Z. Si et al., "Bidirectional broadcasting by using multi-edge type LDPC convolutional codes," i Turbo Codes and Iterative Information Processing (ISTC), 2012 7th International Symposium on, 2012, s. 91-95.
[143]
T. J. Oechtering, M. Wigger och R. Timo, "Broadcast capacity regions with three receivers and message cognition," i Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on, 2012, s. 388-392.
[144]
H. Do, T. Oechtering och M. Skoglund, "Layered quantize-forward for the two-way relay channel," i Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on, 2012, s. 423-427.
[145]
I. Bilal et al., "Managing interference for stabilization over wireless channels," i Intelligent Control (ISIC), 2012 IEEE International Symposium on, 2012, s. 933-938.
[146]
K. Kittichokechai, T. J. Oechtering och M. Skoglund, "Multi-stage coding for channels with a rewrite option and reversible input," i Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on, 2012, s. 3063-3067.
[147]
M. Andersson et al., "Polar codes for bidirectional broadcast channels with common and confidential messages," i International Symposium on Wireless Communication Systems (ISWCS), 2012, 2012, s. 1014-1018.
[148]
R. F. Wyrembelski et al., "Robust transmit strategies for multiantenna bidirectional broadcast channels," i 2012 16th International ITG Workshop on Smart Antennas, WSA 2012, 2012, s. 46-53.
[149]
R. Timo, T. J. Oechtering och M. Wigger, "Source coding with conditionally less noisy side information," i Information Theory Workshop (ITW), 2012 IEEE, 2012, s. 55-59.
[150]
H. Do, T. Oechtering och M. Skoglund, "Capacity bounds for the Z channel," i IEEE Information Theory Workshop (ITW), 2011, 2011.
[151]
K. Kittichokechai, T. J. Oechtering och M. Skoglund, "Capacity of the Channel With Action-dependent State and Reversible Input," i 2011 IEEE Swedish Communication Technologies Workshop, Swe-CTW 2011, 2011, s. 24-28.
[152]
A. A. Zaidi, T. J. Oechtering och M. Skoglund, "Closed-Loop Stabilization Over Gaussian Interference Channel," i Proceedings of the 18th IFAC World Congress, 2011,  Volume 18, Part 1, 2011, s. 14429-14434.
[153]
J. Karlsson et al., "Iterative Source-Channel Coding Approach to Witsenhausen's Counterexample," i Proceedings of the American Control Conference, 2011, s. 5348-5353.
[154]
H. Do, T. Oechtering och M. Skoglund, "Noisy network coding approach to the interference channel with receiver cooperation," i 49th Annual Allerton Conference on Communication, Control, and Computing, 2011., 2011, s. 839-846.
[155]
A. A. Zaidi et al., "On Optimal Policies for Control and Estimation Over a Gaussian Relay Channel," i 2011 Conference on Decision and Control, 2011, s. 5720-5725.
[156]
K. Kittichokechai, T. J. Oechtering och M. Skoglund, "On the capacity of a channel with action-dependent state and reversible input," i IEEE International Symposium on Information Theory - Proceedings, 2011, s. 331-335.
[157]
T. T. Do, T. Oechtering och M. Skoglund, "Optimal transmission for the MIMO bidirectional broadcast channel in the wideband regime," i IEEE Workshop on Signal Processing Advances in Wireless Communications, SPAWC, 2011, s. 356-360.
[158]
K. Kittichokechai, T. J. Oechtering och M. Skoglund, "Secure source coding with action-dependent side information," i IEEE International Symposium on Information Theory - Proceedings, 2011, s. 1678-1682.
[159]
A. A. Zaidi et al., "Sufficient conditions for closed-loop control over a Gaussian relay channel," i 2011 AMERICAN CONTROL CONFERENCE, 2011, s. 2240-2245.
[160]
T. J. Oechtering, H. Do och M. Skoglund, "Achievable rates for embedded bidirectional relaying in a cellular downlink," i 2010 IEEE International Conference On Communications - ICC 2010, 2010, s. 5502395.
[161]
T. J. Oechtering, H. Do och M. Skoglund, "Capacity-achieving coding for cellular downlink with bidirectional communication," i 2010 International ITG Conference on Source and Channel Coding, 2010, s. 5447132.
[162]
H. Do, T. Oechtering och M. Skoglund, "Coding for the Z Channel With a Digital Relay Link," i 2010 IEEE Information Theory Workshop, ITW 2010 - Proceedings, 2010.
[163]
T. Oechtering och V. Rathi, "Coding of streaming sources for the bidirectional broadcast channel : (Invited Paper)," i 2010 5th International ICST Conference on Communications and Networking in China, ChinaCom 2010, 2010, s. 5684634.
[164]
R. F. Wyrembelski, T. J. Oechtering och H. Boche, "MIMO bidirectional broadcast channels with common message," i 2010 IEEE Global Telecommunications Conference (GLOBECOM 2010), 2010, s. 5683208.
[165]
A. A. Zaidi, T. J. Oechtering och M. Skoglund, "Rate sufficient conditions for closed-loop control over AWGN relay channels," i 2010 8th IEEE International Conference on Control and Automation, ICCA 2010, 2010, s. 602-607.
[166]
K. Kittichokechai, T. J. Oechtering och M. Skoglund, "Source Coding With Common Reconstruction and Action-dependent Side Information," i 2010 IEEE Information Theory Workshop, ITW 2010 - Proceedings, 2010, s. 5592707.
[167]
K. Kittichokechai et al., "Source and channel coding with action-dependent partially known two-sided state information," i IEEE International Symposium on Information Theory - Proceedings, 2010, s. 629-633.
[168]
A. A. Zaidi, T. J. Oechtering och M. Skoglund, "Sufficient Conditions for Closed-Loop Control Over Multiple-Access and Broadcast Channels," i 49TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2010, s. 4771-4776.
[169]
H. Do, T. Oechtering och M. Skoglund, "The Gaussian Z-interference channel with rate-constrained conferencing decoders," i 2010 IEEE International Conference on Communications, 2010, s. 5502610.
[170]
T. J. Oechtering och M. Skoglund, "Upper bound to error probability for coding on bidirectional broadcast channels," i ICT 2010 : 2010 17th International Conference on Telecommunications, 2010, s. 48-55.
[171]
H. Do, T. Oechtering och M. Skoglund, "An Achievable Rate Region for the Gaussian Z-interference Channel with Conferencing," i 2009 47TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1 AND 2, 2009, s. 75-81.
[172]
T. J. Oechtering, M. Andersson och M. Skoglund, "Arimoto-Blahut algorithm for the bidirectional broadcast channel with side information," i 2009 IEEE Information Theory Workshop : ITW 2009, 2009, s. 394-398.
[173]
T. J. Oechtering och M. Skoglund, "Coding for the Bidirectional Broadcast Channel with Random States known at the Encoder," i 2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, s. 2013-2017.
[174]
R. F. Wyrembelski et al., "On the Capacity of Bidirectional Broadcast Channels under Channel Uncertainty," i 2009 IEEE International Conference on Communications, 2009, s. 1583-1587.
[175]
T. J. Oechtering, R. F. Wyrembelski och H. Boche, "On the Optimal Transmission for the MIMO Bidirectional Broadcast Channel," i 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, s. 1742-1746.
[176]
C. Schnurr, S. Stanczak och T. J. Oechtering, "Achievable rates for the restricted half-duplex two-way relay channel under a partial-decode-and-forward protocol," i 2008 IEEE INFORMATION THEORY WORKSHOP, 2008, s. 134-138.
[177]
R. F. Wyrembelski et al., "Capacity of Gaussian MIMO Bidirectional Broadcast Channels," i 2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, s. 584-588.
[178]
C. Schnurr, S. Stanczak och T. J. Oechtering, "Coding Theorems for the Restricted Half-Duplex Two-Way Relay Channel with Joint Decoding," i 2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, s. 2688-2692.
[179]
R. F. Wyrembelski, T. J. Oechtering och H. Boche, "Decode-and-Forward Strategies for Bidirectional Relaying," , 2008.
[180]
T. J. Oechtering, R. F. Wyrembelski och H. Boche, "Optimal Time-Division of Two-Phase Decode-and-Forward Bidirectional Relaying," i 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, s. 829-834.
[181]
T. J. Oechtering, R. F. Wyrembelski och H. Boche, "Optimal transmit strategy for the 2 x 1 MISO bidirectional broadcast channel," i 2008 IEEE 9TH WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS, VOLS 1 AND 2, 2008, s. 316-320.
[182]
T. J. Oechtering et al., "Achievable rate region of a two phase bidirectional relay channel," i 2007 41ST ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1 AND 2, 2007, s. 408-413.
[183]
C. Schnurr, T. J. Oechtering och S. Stanczak, "Achievable rates for the restricted half-duplex two-way relay channel," i CONFERENCE RECORD OF THE FORTY-FIRST ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, VOLS 1-5, 2007, s. 1468-1472.
[184]
C. Schnurr, T. J. Oechtering och S. Stanczak, "On coding for the broadcast phase in the two-way relay channel," i 2007 41ST ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1 AND 2, 2007, s. 271-276.
[185]
I. Bjelakovic et al., "On the strong converse for the broadcast capacity region of two-phase bidirectional relaying," i Proceedings of the 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, ITW, 2007, s. 111-115.
[186]
T. J. Oechtering och H. Boche, "Optimal transmit strategies in multi-antenna bidirectional relaying," i 2007 IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol III, Pts 1-3, Proceedings, 2007, s. 145-148.
[187]
T. J. Oechtering och H. Boche, "Piggyback a common message on bidirectional relaying," i 2007 5TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC AND WIRELESS NETWORKS AND WORKSHOPS, VOLS 1-2, 2007, s. 495-502.
[188]
T. J. Oechtering och H. Boche, "Relay selection in bidirectional relay communication," i 2007 IEEE 8TH WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS, VOLS 1 AND 2, 2007, s. 320-324.
[189]
T. J. Oechtering, B. Schubert och H. Boche, "FIR Linear Relay Network with Frequency Selective Channels," i 2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, s. 4065-4070.
[190]
T. J. Oechtering och H. Boche, "Stability region of an efficient bidirectional regenerative half-duplex relaying protocol," i Proceedings of 2006 IEEE Information Theory Workshop, 2006, s. 380-384.
[191]
T. J. Oechtering och H. Boche, "Capacity of a Gaussian FIR linear relay network," i 2005 International Conference on Wireless Networks, Communications and Mobile Computing, Vols 1 and 2, 2005, s. 1307-1312.
[192]
E. A. Jorswieck, T. J. Oechtering och H. Boche, "Performance analysis of combining techniques with correlated diversity," i 2005 IEEE Wireless Communications and Networking Conference : WCNC 2005: BROADBAND WIRELESS FOR THE MASSES READY FOR TAKE-OFF., 2005, s. 849-854.
[193]
T. J. Oechtering och A. Sezgin, "A new cooperative transmission scheme using the space-time delay code," i 2004 ITG : WORKSHOP ON SMART ANTENNAS, PROCEEDINGS, 2004, s. 41-48.
[194]
A. Sezgin och T. J. Oechtering, "A new resource efficient transmission scheme for Cooperative Systems," i 2004 IEEE 5TH WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS, 2004, s. 298-302.
[195]
A. Sezgin och T. J. Oechtering, "Antenna selection with capacity-approaching space-time block codes," i CONFERENCE RECORD OF THE THIRTY-EIGHTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, VOLS 1 AND 2, 2004, s. 1291-1294.
[196]
A. Sezgin och T. J. Oechtering, "On the outage probability of quasi-orthogonal space-time codes," i 2004 IEEE INFORMATION THEORY WORKSHOP, PROCEEDINGS, 2004, s. 381-386.
[197]
T. J. Oechtering och H. Boche, "On the capacity of a distributed multiantenna system using cooperative transmitters," i 57TH IEEE VEHICULAR TECHNOLOGY CONFERENCE, VTC 2003-SPRING, VOLS 1-4, PROCEEDINGS, 2003, s. 75-79.
[198]
T. J. Oechtering och H. Boche, "Optimality range of transmission over different terminals in cooperative multiantenna systems," i 2003 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL IV, PROCEEDINGS : SIGNAL PROCESSING FOR COMMUNICATIONS SPECIAL SESSIONS, 2003, s. 365-368.

Icke refereegranskade

Artiklar

[199]
D. Gunduz et al., "Guest Editorial : Privacy and Security in Smart Grids," IET SMART GRID, vol. 3, no. 5, s. 549-550, 2020.

Kapitel i böcker

[200]
Z. Li, Y. You och T. J. Oechtering, "Privacy against adversarial hypothesis testing : Theory and application to smart meter privacy problem," i Privacy in Dynamical Systems, : Springer Singapore, 2019, s. 43-64.
Senaste synkning med DiVA:
2024-04-21 03:36:24