Publications by Tobias Oechtering
Peer reviewed
Articles
[1]
R. R. Avula, T. J. Oechtering and D. Månsson, "Adversarial Inference Control in Cyber-Physical Systems : A Bayesian Approach With Application to Smart Meters," IEEE Access, vol. 12, pp. 24933-24948, 2024.
[2]
A. Zamani, T. J. Oechtering and M. Skoglund, "On the Privacy-Utility Trade-Off With and Without Direct Access to the Private Data," IEEE Transactions on Information Theory, vol. 70, no. 3, pp. 2177-2200, 2024.
[3]
M. Le Treust and T. J. Oechtering, "Power-Estimation Trade-Off of Vector-Valued Witsenhausen Counterexample With Causal Decoder," IEEE Transactions on Information Theory, vol. 70, no. 3, pp. 1588-1609, 2024.
[4]
Y. You, Z. Li and T. J. Oechtering, "Non-Cooperative Games for Privacy-Preserving and Cost-Efficient Smart Grid Energy Management," IEEE Transactions on Information Forensics and Security, vol. 18, pp. 423-434, 2023.
[5]
S. Saeidian et al., "Pointwise Maximal Leakage," IEEE Transactions on Information Theory, vol. 69, no. 12, pp. 8054-8080, 2023.
[6]
Y. You and T. J. Oechtering, "Time-adaptive Expectation MaximizationLearning Framework for HMM basedData-driven Gas Sensor Calibration," IEEE Transactions on Industrial Informatics, vol. 19, no. 7, pp. 7986-7994, 2023.
[7]
A. Zamani, T. J. Oechtering and M. Skoglund, "Data Disclosure With Non-Zero Leakage and Non-Invertible Leakage Matrix," IEEE Transactions on Information Forensics and Security, vol. 17, pp. 165-179, 2022.
[8]
Y. You et al., "On Data-Driven Self-Calibration for IoT-Based Gas Concentration Monitoring Systems," IEEE Internet of Things Journal, pp. 1-1, 2022.
[9]
A. Zamanisiboni, T. J. Oechtering and M. Skoglund, "A Design Framework for Strongly chi(2)-Private Data Disclosure," IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2312-2325, 2021.
[10]
R. R. Avula et al., "Design Framework for Privacy-Aware Demand-Side Management with Realistic Energy Storage Model," IEEE Transactions on Smart Grid, vol. 12, no. 4, pp. 3503-3513, 2021.
[11]
Y. You, Z. Li and T. J. Oechtering, "Energy Management Strategy for Smart Meter Privacy and Cost Saving," IEEE Transactions on Information Forensics and Security, vol. 16, pp. 1522-1537, 2021.
[12]
L. Zhou, T. J. Oechtering and M. Skoglund, "Fundamental Limits-Achieving Polar Code Designs for Biometric Identification and Authentication," IEEE Transactions on Information Forensics and Security, pp. 1-1, 2021.
[13]
M. T. Vu, T. J. Oechtering and M. Skoglund, "Hypothesis Testing and Identification Systems," IEEE Transactions on Information Theory, vol. 67, no. 6, pp. 3765-3780, 2021.
[14]
J. P. Champati et al., "Minimum Achievable Peak Age of Information Under Service Preemptions and Request Delay," IEEE Journal on Selected Areas in Communications, vol. 39, no. 5, pp. 1365-1379, 2021.
[15]
L. Zhou et al., "Privacy-Preserving Identification Systems With Noisy Enrollment," IEEE Transactions on Information Forensics and Security, vol. 16, pp. 3510-3523, 2021.
[16]
S. Saeidian et al., "Quantifying Membership Privacy via Information Leakage," IEEE Transactions on Information Forensics and Security, vol. 16, pp. 3096-3108, 2021.
[17]
H. Ghourchian et al., "Secure Block Source Coding With Sequential Encoding," IEEE Journal on Selected Areas in Information Theory, vol. 2, no. 1, 2021.
[18]
L. Zhou et al., "Two-Stage Biometric Identification Systems without Privacy Leakage," IEEE Journal on Selected Areas in Information Theory, 2021.
[19]
M. T. Vu et al., "Uncertainty in Identification Systems," IEEE Transactions on Information Theory, vol. 67, no. 3, pp. 1400-1414, 2021.
[20]
P. Cao and T. J. Oechtering, "Optimal Transmit Strategies for Gaussian MISO Wiretap Channels," IEEE Transactions on Information Forensics and Security, vol. 15, pp. 829-838, 2020.
[21]
M. T. Vu, T. J. Oechtering and M. Skoglund, "Hierarchical Identification with Pre-processing," IEEE Transactions on Information Theory, vol. 66, no. 1, pp. 82-113, 2019.
[22]
Z. Li, T. J. Oechtering and D. Gunduz, "Privacy Against a Hypothesis Testing Adversary," IEEE Transactions on Information Forensics and Security, vol. 14, no. 6, pp. 1567-1581, 2019.
[23]
M. Wiese et al., "Secure Estimation and Zero-Error Secrecy Capacity," IEEE Transactions on Automatic Control, vol. 64, no. 3, pp. 1047-1062, 2019.
[24]
R. Mochaourab and T. J. Oechtering, "Private Filtering for Hidden Markov Models," IEEE Signal Processing Letters, vol. 25, no. 6, pp. 888-892, 2018.
[25]
L. P. Cao, T. J. Oechtering and M. Skoglund, "Transmit Beamforming for Single-User Large-Scale MISO Systems With Sub-Connected Architecture and Power Constraints," IEEE Communications Letters, vol. 22, no. 10, pp. 2096-2099, 2018.
[26]
[27]
T. T. Do et al., "Massive MIMO Pilot Retransmission Strategies for Robustification Against Jamming," IEEE Wireless Communications Letters, vol. 6, no. 1, pp. 58-61, 2017.
[28]
Z. Li and T. Oechtering, "Privacy-Constrained Parallel Distributed Neyman-Pearson Test," IEEE Transactions on Signal and Information Processing over Networks, vol. 3, no. 1, pp. 77-90, 2017.
[29]
T. T. Do et al., "Uplink Waveform Channel With Imperfect Channel State Information and Finite Constellation Input," IEEE Transactions on Wireless Communications, vol. 16, no. 2, pp. 1107-1119, 2017.
[30]
A. A. Zaidi et al., "On the tightness of linear policies for stabilization of linear systems over Gaussian networks," Systems & control letters (Print), vol. 88, pp. 32-38, 2016.
[31]
P. Cao et al., "Optimal Transmit Strategy for MISO Channels with Joint Sum and Per-antenna Power Constraints," IEEE Transactions on Signal Processing, 2016.
[32]
K. Kittichokechai et al., "Secure Source Coding With a Public Helper," IEEE Transactions on Information Theory, vol. 62, no. 7, pp. 3930-3949, 2016.
[33]
K. Kittichokechai, T. J. Oechtering and M. Skoglund, "Coding With Action-Dependent Side Information and Additional Reconstruction Requirements," IEEE Transactions on Information Theory, vol. 61, no. 11, pp. 6355-6367, 2015.
[34]
O. Goubet et al., "Low-Complexity Scalable Iterative Algorithms for IEEE 802.11p Receivers," IEEE Transactions on Vehicular Technology, vol. 64, no. 9, pp. 3944-3956, 2015.
[35]
S. M. Kim et al., "On the Entropy Computation of Large Complex Gaussian Mixture Distributions," IEEE Transactions on Signal Processing, vol. 63, no. 17, pp. 4710-4723, 2015.
[36]
Z. Li and T. Oechtering, "Privacy-Aware Distributed Bayesian Detection," IEEE Journal on Selected Topics in Signal Processing, vol. 9, no. 7, pp. 1345-1357, 2015.
[37]
K. Kittichokechai et al., "Secure Source Coding With Action-Dependent Side Information," IEEE Transactions on Information Theory, vol. 61, no. 12, pp. 6444-6464, 2015.
[38]
T. T. Do et al., "Waveform domain framework for capacity analysis of uplink WCDMA systems," EURASIP Journal on Wireless Communications and Networking, 2015.
[39]
H. T. Do, T. J. Oechtering and M. Skoglund, "Layered Coding for the Interference Channel With a Relay," IEEE Transactions on Information Theory, vol. 60, no. 10, pp. 6154-6180, 2014.
[40]
R. Timo, T. J. Oechtering and M. Wigger, "Source Coding Problems With Conditionally Less Noisy Side Information," IEEE Transactions on Information Theory, vol. 60, no. 9, pp. 5516-5532, 2014.
[41]
A. A. Zaidi et al., "Stabilization of Linear Systems Over Gaussian Networks," IEEE Transactions on Automatic Control, vol. 59, no. 9, pp. 2369-2384, 2014.
[42]
T. J. Oechtering and M. Skoglund, "Bidirectional Broadcast Channel With Random States Noncausally Known at the Encoder," IEEE Transactions on Information Theory, vol. 59, no. 1, pp. 64-75, 2013.
[43]
H. Do, T. Oechtering and M. Skoglund, "On Asymmetric Interference Channels with Cooperating Receivers," IEEE Transactions on Communications, vol. 61, no. 2, pp. 554-563, 2013.
[44]
A. A. Zaidi et al., "On optimal policies for control and estimation over a Gaussian relay channel," Automatica, vol. 49, no. 9, pp. 2892-2897, 2013.
[45]
T. T. Do, T. J. Oechtering and M. Skoglund, "Optimal Transmission for the MIMO Bidirectional Broadcast Channel in the Wideband Regime," IEEE Transactions on Signal Processing, vol. 61, no. 20, pp. 5103-5116, 2013.
[46]
M. Andersson et al., "Polar Coding for Bidirectional Broadcast Channels with Common and Confidential Messages," IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 1901-1908, 2013.
[47]
R. F. Wyrembelski, T. J. Oechtering and H. Boche, "MIMO Gaussian Bidirectional Broadcast Channels with Common Messages," IEEE Transactions on Wireless Communications, vol. 10, no. 9, pp. 2950-2959, 2011.
[48]
R. F. Wyrembelski et al., "Optimal Coding Strategies for Bidirectional Broadcast Channels Under Channel Uncertainty," IEEE Transactions on Communications, vol. 58, no. 10, pp. 2984-2994, 2010.
[49]
T. J. Oechtering, R. F. Wyrembelski and H. Boche, "Multiantenna Bidirectional Broadcast Channels-Optimal Transmit Strategies," IEEE Transactions on Signal Processing, vol. 57, no. 5, pp. 1948-1958, 2009.
[50]
T. J. Oechtering et al., "On the Optimal Transmit Strategy for the MIMO Bidirectional Broadcast Channel," IEEE Transactions on Communications, vol. 57, no. 12, pp. 3817-3826, 2009.
[51]
T. J. Oechtering and H. Boche, "Bidirectional regenerative half-duplex relaying using relay selection," IEEE Transactions on Wireless Communications, vol. 7, no. 5, pp. 1879-1888, 2008.
[52]
T. J. Oechtering et al., "Broadcast capacity region of two-phase bidirectional relaying," IEEE Transactions on Information Theory, vol. 54, no. 1, pp. 454-458, 2008.
[53]
A. Sezgin and T. J. Oechtering, "Complete characterization of the equivalent MIMO channel for quasi-orthogonal space-time codes," IEEE Transactions on Information Theory, vol. 54, no. 7, pp. 3315-3327, 2008.
[54]
T. J. Oechtering and H. Boche, "Optimal time-division for bidirectional relaying using superposition encoding," IEEE Communications Letters, vol. 12, no. 4, pp. 265-267, 2008.
[55]
T. J. Oechtering and H. Boche, "Piggyback a common message on half-duplex bidirectional relaying," IEEE Transactions on Wireless Communications, vol. 7, no. 9, pp. 3397-3406, 2008.
[56]
T. J. Oechtering and H. Boche, "Stability region of an optimized bidirectional regenerative half-duplex relaying protocol," IEEE Transactions on Communications, vol. 56, no. 9, pp. 1519-1529, 2008.
[57]
C. M. Walke and T. J. Oechtering, "Analytical expression for uplink C/I-distribution in interference-limited cellular radio systems," Electronics Letters, vol. 38, no. 14, pp. 743-744, 2002.
Conference papers
[58]
A. Zamani et al., "Cache-Aided Private Variable-Length Coding with Zero and Non-Zero Leakage," in 2023 21st International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2023, 2023, pp. 247-254.
[59]
A. Zamani, T. J. Oechtering and M. Skoglund, "Multi-User Privacy Mechanism Design with Non-zero Leakage," in 2023 IEEE Information Theory Workshop, ITW 2023, 2023, pp. 401-405.
[60]
Y. Chen et al., "On Strong Secrecy for Multiple Access Channel with States and causal CSI," in 2023 IEEE International Symposium on Information Theory, ISIT 2023, 2023, pp. 2744-2749.
[61]
S. Saeidian et al., "Pointwise Maximal Leakage on General Alphabets," in 2023 IEEE International Symposium on Information Theory, ISIT 2023, 2023, pp. 388-393.
[62]
A. Zamani, T. J. Oechtering and M. Skoglund, "Private Variable-Length Coding with Non-Zero Leakage," in WIFS 2023 - IEEE Workshop on Information Forensics and Security, 2023.
[63]
A. Zamani et al., "Private Variable-Length Coding with Zero Leakage," in WIFS 2023 - IEEE Workshop on Information Forensics and Security, 2023.
[64]
H. Ghourchian, T. J. Oechtering and M. Skoglund, "Secure Block Joint Source-Channel Coding with Sequential Encoding," in 2023 IEEE International Symposium on Information Theory, ISIT 2023, 2023, pp. 2732-2737.
[65]
A. Gouverneur et al., "Thompson Sampling Regret Bounds for Contextual Bandits with sub-Gaussian rewards," in 2023 IEEE International Symposium on Information Theory, ISIT 2023, 2023, pp. 1306-1311.
[66]
A. Gouverneur et al., "An Information-Theoretic Analysis of Bayesian Reinforcement Learning," in 2022 58Th Annual Allerton Conference On Communication, Control, And Computing (ALLERTON), 2022.
[67]
A. Zamani, T. J. Oechtering and M. Skoglund, "Bounds for Privacy-Utility Trade-off with Non-zero Leakage," in IEEE International Symposium on Information Theory - Proceedings, 2022, pp. 620-625.
[68]
A. Zamani, T. J. Oechtering and M. Skoglund, "Bounds for Privacy-Utility Trade-off with Per-letter Privacy Constraints and Non-zero Leakage," in 2022 IEEE INFORMATION THEORY WORKSHOP (ITW), 2022, pp. 13-18.
[69]
S. Saeidian et al., "Pointwise Maximal Leakage," in IEEE International Symposium on Information Theory - Proceedings, 2022, pp. 626-631.
[70]
R. R. Avula and T. J. Oechtering, "Privacy-Enhancing Appliance Filtering For Smart Meters," in International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2022.
[71]
D. Fay, J. Sjölund and T. J. Oechtering, "Private Learning via Knowledge Transfer with High-Dimensional Targets," in 2022 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2022, pp. 3873-3877.
[72]
Y. Bao, L. Zhou and T. J. Oechtering, "Proof-of-Concept of Polar Codes for Biometric Identification and Authentication," in 2022 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2022.
[73]
L. Zhou, T. J. Oechtering and M. Skoglund, "Uncertainty in Biometric Identification and Authentication Systems with Strong Secrecy," in 2022 58th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 27-30 September 2022, 2022.
[74]
G. Cervia, T. J. Oechtering and M. Skoglund, "(epsilon, n) Fixed-Length Strong Coordination Capacity," in 2021 IEEE Information Theory Workshop (ITW), 2021.
[75]
M. Le Treust and T. J. Oechtering, "Continuous Random Variable Estimation is not Optimal for the Witsenhausen Counterexample," in 2021 IEEE International Symposium on Information Theory (ISIT), 2021, pp. 1889-1894.
[76]
L. Zhou, T. J. Oechtering and M. Skoglund, "Incremental Design of Secure Biometric Identification and Authentication," in 2021 IEEE International Symposium on Information Theory (ISIT), 2021.
[77]
S. Saeidian et al., "Optimal Maximal Leakage-Distortion Tradeoff," in 2021 IEEE Information Theory Workshop, ITW 2021 - Proceedings, 2021.
[78]
L. Zhou, T. J. Oechtering and M. Skoglund, "Polar Codes for Biometric Identification and Authentication," in 2021 IEEE Information Theory Workshop, ITW 2021 - Proceedings, 2021.
[79]
H. Ghourchian et al., "Secure Source Coding with Side-information at Decoder and Shared Key at Encoder and Decoder," in 2021 IEEE Information Theory Workshop, ITW 2021 - Proceedings, 2021.
[80]
Y. You, A. Xu and T. J. Oechtering, "Belief Function Fusion based Self-calibration for Non-dispersive Infrared Gas Sensor," in IEEE Sensors Conference, 2020, pp. 1-4.
[81]
A. Zamani, T. J. Oechtering and M. Skoglund, "Data Disclosure Mechanism Design with Non-zero Leakage," in 2020 IEEE Information Theory Workshop (ITW), 2020.
[82]
Y. You and T. J. Oechtering, "Hidden Markov Model Based Data-driven Calibration of Non-dispersive Infrared Gas Sensor," in 28TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO 2020), 2020, pp. 1717-1721.
[83]
Y. You and T. J. Oechtering, "Hidden Markov Model Based Data-driven Calibration of Nondispersive Infrared Gas Sensor," in Proceedings of EUSIPCO 2020, 2020, pp. 1717-1721.
[84]
R. R. Avula and T. J. Oechtering, "On design of optimal smart meter privacy control strategy against adversarial MAP detection," in Proceedings of the ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2020, pp. 5845-5849.
[85]
J. P. Champati et al., "On the Minimum Achievable Age of Information for General Service-Time Distributions," in Proceedings 39th IEEE Conference on Computer Communications, INFOCOM 2020, 2020.
[86]
Y. You and T. J. Oechtering, "Online Energy Management Strategy Design for Smart Meter Privacy Against FHMM-based NILM," in 2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), 2020.
[87]
R. R. Avula and T. J. Oechtering, "Optimal privacy-by-design strategy for user demand shaping in smart grids," in Proceedings of the 2020 IEEE Power & Energy Society Innovative Smart Grid Technologies, 2020.
[88]
G. Cervia, T. J. Oechtering and M. Skoglund, "Remote Joint Strong Coordination and Reliable Communication," in 2020 IEEE International Symposium on Information Theory (ISIT), 2020.
[89]
H. Ghourchian et al., "Block Source Coding with Sequential Encoding," in 2019 IEEE Information Theory Workshop, ITW 2019, 2019.
[90]
T. J. Oechtering and M. L. Treust, "Coordination Coding with Causal Decoder for Vector-valued Witsenhausen Counterexample Setups," in 2019 IEEE Information Theory Workshop, ITW 2019, 2019, pp. 309-313.
[91]
G. Cervia, T. J. Oechtering and M. Skoglund, "Fixed-Length Strong Coordination," in 2019 IEEE Information Theory Workshop, ITW 2019, 2019.
[92]
L. Zhou et al., "Fundamental Limits for Biometric Identification Systems without Privacy Leakage," in Proceedings 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2019.
[93]
M. T. Vu, T. J. Oechtering and M. Skoglund, "Operational Equivalence of Distributed Hypothesis Testing and Identification Systems," in Proceedings 2019 IEEE International Symposium on Information Theory (ISIT), 2019, pp. 1999-2003.
[94]
M. L. Treust and T. J. Oechtering, "Optimal Control Designs for Vector-valued Witsenhausen Counterexample Setups," in 2018 56th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2018, 2019, pp. 532-537.
[95]
L. Zhou, M. T. Vu and T. J. Oechtering, "Polar Codes for Identification Systems," in Proceedings of the 12th International ITG Conference on Systems, Communications and Coding, 2019.
[96]
Z. Li and T. J. Oechtering, "Privacy-utility management of hypothesis tests," in 2018 IEEE Information Theory Workshop, ITW 2018, 2019.
[97]
R. R. Avula et al., "Smart Meter Privacy Control Strategy Including Energy Storage Degradation," in 2019 IEEE Milan PowerTech, 2019.
[98]
M. T. Vu, T. J. Oechtering and M. Skoglund, "Gaussian hierarchical identification with pre-processing," in Data Compression Conference Proceedings, 2018, pp. 277-286.
[99]
Y. You, Z. Li and T. J. Oechtering, "Optimal Privacy-Enhancing and Cost-Efficient Energy Management Strategies for Smart Grid Consumers," in 2018 IEEE Statistical Signal Processing Workshop, SSP 2018, 2018, pp. 144-148.
[100]
P. Cao, T. J. Oechtering and M. Skoglund, "Precoding Design for Massive MIMO Systems with Sub-connected Architecture and Per-antenna Power Constraints," in WSA 2018 - 22nd International ITG Workshop on Smart Antennas2018 22nd International ITG Workshop on Smart Antennas, WSA 2018, Bochum, 14-16 March 2018, 2018.
[101]
R. R. Avula, T. J. Oechtering and D. Månsson, "Privacy-preserving smart meter control strategy including energy storage losses," in Proceedings - 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe, ISGT-Europe 2018, 2018.
[102]
M. T. Vu, T. J. Oechtering and M. Skoglund, "Testing in Identification Systems," in 2018 IEEE INFORMATION THEORY WORKSHOP (ITW), 2018, pp. 295-299.
[103]
M. T. Vu et al., "Uncertainty in Identification Systems," in IEEE International Symposium on Information Theory - Proceedings, 2018, pp. 2386-2390.
[104]
V. Moles-Cases et al., "A Comparison of OFDM, QAM-FBMC, and OQAM-FBMC Waveforms Subject to Phase Noise," in 2017 IEEE International Conference on Communications (ICC), 2017.
[105]
M. T. Vu, T. J. Oechtering and M. Skoglund, "Hierarchical identification with pre-processing," in 2017 IEEE International Symposium on Information Theory (ISIT), 2017, pp. 2746-2750.
[106]
P. Cao and T. Oechtering, "Optimal Trade-off Between Transmission Rate andSecrecy Rate in Gaussian MISO Wiretap Channels," in The 21st International ITG Workshop on Smart Antennas (WSA 2017), 2017.
[107]
L. P. Cao and T. J. Oechtering, "Optimal transmit strategy for MIMO channels with joint sum and per-antenna power constraints," in 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2017, pp. 3569-3573.
[108]
M. T. Vu, T. J. Oechtering and M. Skoglund, "Polar code for secure Wyner-Ziv coding," in 8th IEEE International Workshop on Information Forensics and Security, WIFS 2016, 2017.
[109]
M. Wiese and T. J. Oechtering, "Secure distributed estimation of linear systems," in 2016 IEEE Conference on Communications and Network Security, CNS 2016, 2017, pp. 616-620.
[110]
Z. Li, T. Oechtering and D. Gunduz, "Smart Meter Privacy Based on Adversarial Hypothesis Testing," in Proceedings of the IEEE International Symposium on Information Theory (ISIT) 2017, 2017, pp. 774-778.
[111]
M. T. Vu et al., "Successive refinement with cribbing and side information," in 54th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2016, 2017, pp. 70-77.
[112]
P. Cao, T. Oechtering and S. Mikael, "Optimal Transmission with Per-antenna Power Constraints for Multiantenna Bidirectional Broadcast Channels," in The Ninth IEEE Sensor Array and Multichannel Signal Processing Workshop, 2016.
[113]
Z. Li, T. Oechtering and M. Skoglund, "Privacy-Preserving Energy Flow Control in Smart Grids," in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP) 2016, 2016.
[114]
T. Tanaka et al., "Rate of prefix-free codes in LQG control systems," in 2016 IEEE International Symposium on Information Theory - Proceedings, 2016, pp. 2399-2403.
[115]
M. Wiese et al., "Secure Estimation for Unstable Systems," in 2016 IEEE 55th Conference on Decision and Control, CDC 2016, 2016, pp. 5059-5064.
[116]
M. Wiese et al., "Uncertain wiretap channels and secure estimation," in 2016 IEEE International Symposium on Information Theory, 2016, pp. 2004-2008.
[117]
T. T. Do et al., "Capacity analysis of uplink WCDMA systems with imperfect channel state information," in IEEE Vehicular Technology Conference, 2015.
[118]
M. T. Vu, T. J. Oechtering and M. Skoglund, "Lossy distributed storage with limited failure loss," in Proceedings of the International Symposium on Wireless Communication Systems, 2015, pp. 191-195.
[119]
P. Cao et al., "Optimal Transmission Rate for MISO Channels with Joint Sum and Per-antenna Power Constraints," in IEEE International Conference on Communications (ICC), London, June 08-12, 2015, 2015, pp. 4727-4732.
[120]
Z. Li and T. Oechtering, "Privacy on Hypothesis Testing in Smart Grids," in Proceedings of the IEEE Information Theory Workshop (ITW) 2015 Jeju, 2015, pp. 337-341.
[121]
T. T. Do et al., "Capacity analysis of continuous-time time-variant asynchronous uplink wideband CDMA system," in IEEE Vehicular Technology Conference, 2014.
[122]
Z. Li and T. Oechtering, "Differential Privacy in Parallel Distributed Bayesian Detections," in Proceedings of the 17th International Conference on Information Fusion (FUSION), 2014, pp. 1-7.
[123]
K. Kittichokechai, T. J. Oechtering and M. Skoglund, "Lossy Source Coding with Reconstruction Privacy," in 2014 IEEE International Symposium on Information Theory (ISIT), 2014, pp. 386-390.
[124]
Z. Li, T. Oechtering and K. Kittichokechai, "Parallel Distributed Bayesian Detection with Privacy Constraints," in Proceedings of the IEEE International Conference on Communications (ICC) 2014, 2014, pp. 2178-2183.
[125]
Z. Li, T. Oechtering and J. Jaldén, "Parallel Distributed Neyman-Pearson Detection with Privacy Constraints," in Proceedings of the IEEE International Conference on Communications (ICC) 2014 Workshop, 2014, pp. 765-770.
[126]
Z. Li and T. Oechtering, "Privacy-Concerned Parallel Distributed Bayesian Sequential Detection," in Proceedings of the IEEE Global Conference on Signal and Information Processing (GlobalSIP) 2014, 2014, pp. 928-932.
[127]
D. Xu et al., "Secure Successive Refinement with Degraded Side Information," in 2014 IEEE International Symposium on Information Theory (ISIT), 2014, pp. 2674-2678.
[128]
S. M. Kim et al., "Sphere decoding inspired approximation method to compute the entropy of large Gaussian mixture distributions," in IEEE Workshop on Statistical Signal Processing Proceedings, 2014, pp. 264-267.
[129]
A. A. Zaidi et al., "Stabilization and Control over Gaussian Networks," in LCCC Workshop in Information and Control in Networks, 2014, pp. 39-85.
[130]
A. A. Zaidi, T. J. Oechtering and M. Skoglund, "Stabilization of noisy plants over a Gaussian interference channel," in IWCIT 2014 - Iran Workshop on Communication and Information Theory, 2014.
[131]
Z. Li and T. Oechtering, "Tandem Distributed Bayesian Detection with Privacy Constraints," in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP) 2014, 2014, pp. 8168-8172.
[132]
I. Bilal et al., "An Optimized Linear Scheme for Stabilization Over Multi-User Gaussian Networks," in 2013 Information Theory And Applications Workshop (ITA), 2013, pp. 290-297.
[133]
H. Do et al., "Capacity Region of a Class of Interfering Relay Channels," in 2013 IEEE Information Theory Workshop (ITW), 2013, p. 6691350.
[134]
M. N. Khormuji, T. J. Oechtering and M. Skoglund, "Capacity Region of the Bidirectional Broadcast Channel with Causal Channel State Information," in Proceedings of the Tenth International Symposium on Wireless Communication Systems (ISWCS 2013), 2013, pp. 274-278.
[135]
J. Jaldén and T. J. Oechtering, "Distributed Bayesian detection for the butterfly network," in 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 2013, pp. 61-65.
[136]
I. Bilal et al., "Feedback stabilization over a Gaussian interference relay channel," in 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications, SPAWC, 2013, pp. 560-564.
[137]
H. Do et al., "Gaussian Interfering Relay Channels," in 2013 Asilomar Conference on Signals, Systems and Computers, 2013, pp. 1968-1972.
[138]
A. A. Zaidi, T. J. Oechtering and M. Skoglund, "On stabilization over a Gaussian interference channel," in 2013 European Control Conference (ECC), 2013, pp. 2386-2391.
[139]
R. Wyrembelski, H. Boche and T. J. Oechtering, "Robust physical layer service integration in bidirectional relay networks : Common messages," in 9th International ITG Conference on Systems, Communications and Coding, SCC 2013, 2013.
[140]
K. Kittichokechai et al., "Secure Source Coding with a Public Helper," in IEEE International Symposium on Information Theory, 2013, pp. 2209-2213.
[141]
R. Timo, T. J. Oechtering and M. Wigger, "Successive refinement with conditionally less noisy side information," in IEEE International Symposium on Information Theory : Proceedings, 2013, pp. 2985-2989.
[142]
H. Do, T. Oechtering and M. Skoglund, "A new inner bound for the interference relay channel," in 2012 46th Annual Conference on Information Sciences and Systems, CISS 2012, 2012, p. 6310756.
[143]
T. T. Do, T. Oechtering and M. Skoglund, "Achievable energy per bit for the multi-pair MIMO bidirectional broadcast channel," in European Wireless, 2012. EW. 18th European Wireless Conference, 2012.
[144]
Z. Si et al., "Bidirectional broadcasting by using multi-edge type LDPC convolutional codes," in Turbo Codes and Iterative Information Processing (ISTC), 2012 7th International Symposium on, 2012, pp. 91-95.
[145]
T. J. Oechtering, M. Wigger and R. Timo, "Broadcast capacity regions with three receivers and message cognition," in Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on, 2012, pp. 388-392.
[146]
H. Do, T. Oechtering and M. Skoglund, "Layered quantize-forward for the two-way relay channel," in Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on, 2012, pp. 423-427.
[147]
I. Bilal et al., "Managing interference for stabilization over wireless channels," in Intelligent Control (ISIC), 2012 IEEE International Symposium on, 2012, pp. 933-938.
[148]
K. Kittichokechai, T. J. Oechtering and M. Skoglund, "Multi-stage coding for channels with a rewrite option and reversible input," in Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on, 2012, pp. 3063-3067.
[149]
M. Andersson et al., "Polar codes for bidirectional broadcast channels with common and confidential messages," in International Symposium on Wireless Communication Systems (ISWCS), 2012, 2012, pp. 1014-1018.
[150]
R. F. Wyrembelski et al., "Robust transmit strategies for multiantenna bidirectional broadcast channels," in 2012 16th International ITG Workshop on Smart Antennas, WSA 2012, 2012, pp. 46-53.
[151]
R. Timo, T. J. Oechtering and M. Wigger, "Source coding with conditionally less noisy side information," in Information Theory Workshop (ITW), 2012 IEEE, 2012, pp. 55-59.
[152]
H. Do, T. Oechtering and M. Skoglund, "Capacity bounds for the Z channel," in IEEE Information Theory Workshop (ITW), 2011, 2011.
[153]
K. Kittichokechai, T. J. Oechtering and M. Skoglund, "Capacity of the Channel With Action-dependent State and Reversible Input," in 2011 IEEE Swedish Communication Technologies Workshop, Swe-CTW 2011, 2011, pp. 24-28.
[154]
A. A. Zaidi, T. J. Oechtering and M. Skoglund, "Closed-Loop Stabilization Over Gaussian Interference Channel," in Proceedings of the 18th IFAC World Congress, 2011, Volume 18, Part 1, 2011, pp. 14429-14434.
[155]
J. Karlsson et al., "Iterative Source-Channel Coding Approach to Witsenhausen's Counterexample," in Proceedings of the American Control Conference, 2011, pp. 5348-5353.
[156]
H. Do, T. Oechtering and M. Skoglund, "Noisy network coding approach to the interference channel with receiver cooperation," in 49th Annual Allerton Conference on Communication, Control, and Computing, 2011., 2011, pp. 839-846.
[157]
A. A. Zaidi et al., "On Optimal Policies for Control and Estimation Over a Gaussian Relay Channel," in 2011 Conference on Decision and Control, 2011, pp. 5720-5725.
[158]
K. Kittichokechai, T. J. Oechtering and M. Skoglund, "On the capacity of a channel with action-dependent state and reversible input," in IEEE International Symposium on Information Theory - Proceedings, 2011, pp. 331-335.
[159]
T. T. Do, T. Oechtering and M. Skoglund, "Optimal transmission for the MIMO bidirectional broadcast channel in the wideband regime," in IEEE Workshop on Signal Processing Advances in Wireless Communications, SPAWC, 2011, pp. 356-360.
[160]
K. Kittichokechai, T. J. Oechtering and M. Skoglund, "Secure source coding with action-dependent side information," in IEEE International Symposium on Information Theory - Proceedings, 2011, pp. 1678-1682.
[161]
A. A. Zaidi et al., "Sufficient conditions for closed-loop control over a Gaussian relay channel," in 2011 AMERICAN CONTROL CONFERENCE, 2011, pp. 2240-2245.
[162]
T. J. Oechtering, H. Do and M. Skoglund, "Achievable rates for embedded bidirectional relaying in a cellular downlink," in 2010 IEEE International Conference On Communications - ICC 2010, 2010, p. 5502395.
[163]
T. J. Oechtering, H. Do and M. Skoglund, "Capacity-achieving coding for cellular downlink with bidirectional communication," in 2010 International ITG Conference on Source and Channel Coding, 2010, p. 5447132.
[164]
H. Do, T. Oechtering and M. Skoglund, "Coding for the Z Channel With a Digital Relay Link," in 2010 IEEE Information Theory Workshop, ITW 2010 - Proceedings, 2010.
[165]
T. Oechtering and V. Rathi, "Coding of streaming sources for the bidirectional broadcast channel : (Invited Paper)," in 2010 5th International ICST Conference on Communications and Networking in China, ChinaCom 2010, 2010, p. 5684634.
[166]
R. F. Wyrembelski, T. J. Oechtering and H. Boche, "MIMO bidirectional broadcast channels with common message," in 2010 IEEE Global Telecommunications Conference (GLOBECOM 2010), 2010, p. 5683208.
[167]
A. A. Zaidi, T. J. Oechtering and M. Skoglund, "Rate sufficient conditions for closed-loop control over AWGN relay channels," in 2010 8th IEEE International Conference on Control and Automation, ICCA 2010, 2010, pp. 602-607.
[168]
K. Kittichokechai, T. J. Oechtering and M. Skoglund, "Source Coding With Common Reconstruction and Action-dependent Side Information," in 2010 IEEE Information Theory Workshop, ITW 2010 - Proceedings, 2010, p. 5592707.
[169]
K. Kittichokechai et al., "Source and channel coding with action-dependent partially known two-sided state information," in IEEE International Symposium on Information Theory - Proceedings, 2010, pp. 629-633.
[170]
A. A. Zaidi, T. J. Oechtering and M. Skoglund, "Sufficient Conditions for Closed-Loop Control Over Multiple-Access and Broadcast Channels," in 49TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2010, pp. 4771-4776.
[171]
H. Do, T. Oechtering and M. Skoglund, "The Gaussian Z-interference channel with rate-constrained conferencing decoders," in 2010 IEEE International Conference on Communications, 2010, p. 5502610.
[172]
T. J. Oechtering and M. Skoglund, "Upper bound to error probability for coding on bidirectional broadcast channels," in ICT 2010 : 2010 17th International Conference on Telecommunications, 2010, pp. 48-55.
[173]
H. Do, T. Oechtering and M. Skoglund, "An Achievable Rate Region for the Gaussian Z-interference Channel with Conferencing," in 2009 47TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1 AND 2, 2009, pp. 75-81.
[174]
T. J. Oechtering, M. Andersson and M. Skoglund, "Arimoto-Blahut algorithm for the bidirectional broadcast channel with side information," in 2009 IEEE Information Theory Workshop : ITW 2009, 2009, pp. 394-398.
[175]
T. J. Oechtering and M. Skoglund, "Coding for the Bidirectional Broadcast Channel with Random States known at the Encoder," in 2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, pp. 2013-2017.
[176]
R. F. Wyrembelski et al., "On the Capacity of Bidirectional Broadcast Channels under Channel Uncertainty," in 2009 IEEE International Conference on Communications, 2009, pp. 1583-1587.
[177]
T. J. Oechtering, R. F. Wyrembelski and H. Boche, "On the Optimal Transmission for the MIMO Bidirectional Broadcast Channel," in 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, pp. 1742-1746.
[178]
C. Schnurr, S. Stanczak and T. J. Oechtering, "Achievable rates for the restricted half-duplex two-way relay channel under a partial-decode-and-forward protocol," in 2008 IEEE INFORMATION THEORY WORKSHOP, 2008, pp. 134-138.
[179]
R. F. Wyrembelski et al., "Capacity of Gaussian MIMO Bidirectional Broadcast Channels," in 2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, pp. 584-588.
[180]
C. Schnurr, S. Stanczak and T. J. Oechtering, "Coding Theorems for the Restricted Half-Duplex Two-Way Relay Channel with Joint Decoding," in 2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, pp. 2688-2692.
[181]
R. F. Wyrembelski, T. J. Oechtering and H. Boche, "Decode-and-Forward Strategies for Bidirectional Relaying," , 2008.
[182]
T. J. Oechtering, R. F. Wyrembelski and H. Boche, "Optimal Time-Division of Two-Phase Decode-and-Forward Bidirectional Relaying," in 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, pp. 829-834.
[183]
T. J. Oechtering, R. F. Wyrembelski and H. Boche, "Optimal transmit strategy for the 2 x 1 MISO bidirectional broadcast channel," in 2008 IEEE 9TH WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS, VOLS 1 AND 2, 2008, pp. 316-320.
[184]
T. J. Oechtering et al., "Achievable rate region of a two phase bidirectional relay channel," in 2007 41ST ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1 AND 2, 2007, pp. 408-413.
[185]
C. Schnurr, T. J. Oechtering and S. Stanczak, "Achievable rates for the restricted half-duplex two-way relay channel," in CONFERENCE RECORD OF THE FORTY-FIRST ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, VOLS 1-5, 2007, pp. 1468-1472.
[186]
C. Schnurr, T. J. Oechtering and S. Stanczak, "On coding for the broadcast phase in the two-way relay channel," in 2007 41ST ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1 AND 2, 2007, pp. 271-276.
[187]
I. Bjelakovic et al., "On the strong converse for the broadcast capacity region of two-phase bidirectional relaying," in Proceedings of the 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, ITW, 2007, pp. 111-115.
[188]
T. J. Oechtering and H. Boche, "Optimal transmit strategies in multi-antenna bidirectional relaying," in 2007 IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol III, Pts 1-3, Proceedings, 2007, pp. 145-148.
[189]
T. J. Oechtering and H. Boche, "Piggyback a common message on bidirectional relaying," in 2007 5TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC AND WIRELESS NETWORKS AND WORKSHOPS, VOLS 1-2, 2007, pp. 495-502.
[190]
T. J. Oechtering and H. Boche, "Relay selection in bidirectional relay communication," in 2007 IEEE 8TH WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS, VOLS 1 AND 2, 2007, pp. 320-324.
[191]
T. J. Oechtering, B. Schubert and H. Boche, "FIR Linear Relay Network with Frequency Selective Channels," in 2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, pp. 4065-4070.
[192]
T. J. Oechtering and H. Boche, "Stability region of an efficient bidirectional regenerative half-duplex relaying protocol," in Proceedings of 2006 IEEE Information Theory Workshop, 2006, pp. 380-384.
[193]
T. J. Oechtering and H. Boche, "Capacity of a Gaussian FIR linear relay network," in 2005 International Conference on Wireless Networks, Communications and Mobile Computing, Vols 1 and 2, 2005, pp. 1307-1312.
[194]
E. A. Jorswieck, T. J. Oechtering and H. Boche, "Performance analysis of combining techniques with correlated diversity," in 2005 IEEE Wireless Communications and Networking Conference : WCNC 2005: BROADBAND WIRELESS FOR THE MASSES READY FOR TAKE-OFF., 2005, pp. 849-854.
[195]
T. J. Oechtering and A. Sezgin, "A new cooperative transmission scheme using the space-time delay code," in 2004 ITG : WORKSHOP ON SMART ANTENNAS, PROCEEDINGS, 2004, pp. 41-48.
[196]
A. Sezgin and T. J. Oechtering, "A new resource efficient transmission scheme for Cooperative Systems," in 2004 IEEE 5TH WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS, 2004, pp. 298-302.
[197]
A. Sezgin and T. J. Oechtering, "Antenna selection with capacity-approaching space-time block codes," in CONFERENCE RECORD OF THE THIRTY-EIGHTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, VOLS 1 AND 2, 2004, pp. 1291-1294.
[198]
A. Sezgin and T. J. Oechtering, "On the outage probability of quasi-orthogonal space-time codes," in 2004 IEEE INFORMATION THEORY WORKSHOP, PROCEEDINGS, 2004, pp. 381-386.
[199]
T. J. Oechtering and H. Boche, "On the capacity of a distributed multiantenna system using cooperative transmitters," in 57TH IEEE VEHICULAR TECHNOLOGY CONFERENCE, VTC 2003-SPRING, VOLS 1-4, PROCEEDINGS, 2003, pp. 75-79.
[200]
T. J. Oechtering and H. Boche, "Optimality range of transmission over different terminals in cooperative multiantenna systems," in 2003 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL IV, PROCEEDINGS : SIGNAL PROCESSING FOR COMMUNICATIONS SPECIAL SESSIONS, 2003, pp. 365-368.
Non-peer reviewed
Articles
[201]
D. Gunduz et al., "Guest Editorial : Privacy and Security in Smart Grids," IET SMART GRID, vol. 3, no. 5, pp. 549-550, 2020.
Chapters in books
[202]
Z. Li, Y. You and T. J. Oechtering, "Privacy against adversarial hypothesis testing : Theory and application to smart meter privacy problem," in Privacy in Dynamical Systems, : Springer Singapore, 2019, pp. 43-64.
Latest sync with DiVA:
2024-05-29 01:19:34