Electrical network frequency (ENF) maximum-likelihood estimation via a multitone harmonic model D Bykhovsky, A Cohen IEEE Transactions on Information Forensics and Security 8 (5), 744-753, 2013 | 70 | 2013 |
Multi-antenna jamming in covert communication O Shmuel, A Cohen, O Gurewitz IEEE Transactions on Communications 69 (7), 4644-4658, 2021 | 58 | 2021 |
Why botnets work: Distributed brute-force attacks need no synchronization S Salamatian, W Huleihel, A Beirami, A Cohen, M Médard IEEE Transactions on Information Forensics and Security 14 (9), 2288-2299, 2019 | 50 | 2019 |
Lower bounds on the error probability of block codes based on improvements on de Caen's inequality A Cohen, N Merhav IEEE Transactions on Information Theory 50 (2), 290-310, 2004 | 50 | 2004 |
Universal randomized guessing with application to asynchronous decentralized brute–force attacks N Merhav, A Cohen IEEE Transactions on Information Theory 66 (1), 114-129, 2019 | 45 | 2019 |
Efficient data collection over multiple access wireless sensors network A Cohen, A Cohen, O Gurewitz IEEE/ACM Transactions on Networking 28 (2), 491-504, 2020 | 38* | 2020 |
Privacy-Aware Distributed Hypothesis Testing S Sreekumar, A Cohen, D Gündüz Entropy 22 (6), 2020 | 36* | 2020 |
Traffic classification based on zero-length packets J Kampeas, A Cohen, O Gurewitz IEEE Transactions on Network and Service Management 15 (3), 1049-1062, 2018 | 33 | 2018 |
Centralized vs decentralized targeted brute-force attacks: Guessing with side-information S Salamatian, W Huleihel, A Beirami, A Cohen, M Médard IEEE Transactions on Information Forensics and Security 15, 3749-3759, 2020 | 27* | 2020 |
Secure multi-source multicast A Cohen, A Cohen, M Medard, O Gurewitz IEEE Transactions on Communications 67 (1), 708-723, 2018 | 25* | 2018 |
Wiretap channel with causal state information and secure rate-limited feedback A Cohen, A Cohen IEEE Transactions on Communications 64 (3), 1192-1203, 2016 | 25 | 2016 |
Distributed inter-cell interference mitigation via joint scheduling and power control under noise rise constraints E Biton, A Cohen, G Reina, O Gurewitz IEEE transactions on wireless communications 13 (6), 3464-3477, 2014 | 24 | 2014 |
Secure group testing A Cohen, A Cohen, O Gurewitz IEEE Transactions on Information Forensics and Security 16, 4003-4018, 2020 | 22* | 2020 |
Anomaly detection for individual sequences with applications in identifying malicious tools S Siboni, A Cohen Entropy 22 (6), 649, 2020 | 20* | 2020 |
Capacity of distributed opportunistic scheduling in nonhomogeneous networks J Kampeas, A Cohen, O Gurewitz IEEE Transactions on Information Theory 60 (11), 7231-7247, 2014 | 20* | 2014 |
SINR diagram with interference cancellation C Avin, A Cohen, Y Haddad, E Kantor, Z Lotker, M Parter, D Peleg Ad Hoc Networks 54, 1-16, 2017 | 19* | 2017 |
Scanning and Sequential Decision Making for Multidimensional Data–Part I: The Noiseless Case A Cohen, N Merhav, T Weissman IEEE transactions on information theory 53 (9), 3001-3020, 2007 | 18* | 2007 |
When physics meets signal processing: Image and video denoising based on Ising theory E Cohen, R Heiman, M Carmi, O Hadar, A Cohen Signal Processing: Image Communication 34, 14-21, 2015 | 17* | 2015 |
Scanning and sequential decision making for multidimensional data—Part II: The noisy case A Cohen, T Weissman, N Merhav IEEE transactions on information theory 54 (12), 5609-5631, 2008 | 16 | 2008 |
Network coding based information spreading in dynamic networks with correlated data A Cohen, B Haeupler, C Avin, M Médard IEEE Journal on Selected Areas in Communications 33 (2), 213-224, 2014 | 14* | 2014 |