Limits of reliable communication with low probability of detection on AWGN channels BA Bash, D Goeckel, D Towsley IEEE Journal on Selected Areas in Communications 31 (9), 1921-1930, 2013 | 745 | 2013 |
Covert communication in the presence of an uninformed jammer TV Sobers, BA Bash, S Guha, D Towsley, D Goeckel IEEE Transactions on Wireless Communications 16 (9), 6193-6206, 2017 | 354 | 2017 |
Hiding information in noise: Fundamental limits of covert wireless communication BA Bash, D Goeckel, D Towsley, S Guha IEEE Communications Magazine 53 (12), 26-31, 2015 | 321 | 2015 |
Covert wireless communication with artificial noise generation R Soltani, D Goeckel, D Towsley, B Bash, S Guha IEEE Transactions on Wireless Communications, 2018 | 162 | 2018 |
Covert communications when the warden does not know the background noise power D Goeckel, B Bash, S Guha, D Towsley IEEE Communications Letters 20 (2), 236-239, 2015 | 136 | 2015 |
Covert Communication Gains from Adversary's Ignorance of Transmission Time B Bash, D Goeckel, D Towsley IEEE Transactions on Wireless Communications, 2016 | 129 | 2016 |
Exact distributed Voronoi cell computation in sensor networks BA Bash, PJ Desnoyers Proceedings of the 6th international conference on Information processing in …, 2007 | 113 | 2007 |
Quantum-secure covert communication on bosonic channels BA Bash, AH Gheorghe, M Patel, JL Habif, D Goeckel, D Towsley, S Guha Nature communications 6, 8626, 2015 | 110 | 2015 |
Square root law for communication with low probability of detection on AWGN channels BA Bash, D Goeckel, D Towsley 2012 IEEE International Symposium on Information Theory Proceedings, 448-452, 2012 | 107 | 2012 |
LPD communication when the warden does not know when BA Bash, D Goeckel, D Towsley 2014 IEEE International Symposium on Information Theory, 606-610, 2014 | 90 | 2014 |
Multi-hop routing in covert wireless networks A Sheikholeslami, M Ghaderi, D Towsley, BA Bash, S Guha, D Goeckel IEEE Transactions on Wireless Communications 17 (6), 3656-3669, 2018 | 76 | 2018 |
Approximately uniform random sampling in sensor networks BA Bash, JW Byers, J Considine Proceeedings of the 1st international workshop on Data management for sensor …, 2004 | 70 | 2004 |
Covert single-hop communication in a wireless network with distributed artificial noise generation R Soltani, B Bash, D Goeckel, S Guha, D Towsley 2014 52nd Annual Allerton Conference on communication, control, and …, 2014 | 57 | 2014 |
Covert communication over classical-quantum channels A Sheikholeslami, BA Bash, D Towsley, D Goeckel, S Guha 2016 IEEE International Symposium on Information Theory (ISIT), 2064-2068, 2016 | 46 | 2016 |
Fundamental limits of quantum-secure covert communication over bosonic channels MS Bullock, CN Gagatsos, S Guha, BA Bash IEEE Journal on Selected Areas in Communications 38 (3), 471-482, 2020 | 37 | 2020 |
Covert communication with the help of an uninformed jammer achieves positive rate TV Sobers, BA Bash, D Goeckel, S Guha, D Towsley 2015 49th Asilomar Conference on Signals, Systems and Computers, 625-629, 2015 | 37 | 2015 |
Infinite-fold enhancement in communications capacity using pre-shared entanglement S Guha, Q Zhuang, BA Bash 2020 IEEE International Symposium on Information Theory (ISIT), 1835-1839, 2020 | 29 | 2020 |
Covert Capacity of Bosonic Channels CN Gagatsos, MS Bullock, BA Bash IEEE Journal on Selected Areas in Information Theory 1 (2), 555-567, 2020 | 24 | 2020 |
Post-IPO Flipping and Turnover: Predictive Factors for Long-Run Returns B Bash Available at SSRN 620164, 2001 | 23 | 2001 |
Quantum noise limited optical communication with low probability of detection BA Bash, S Guha, D Goeckel, D Towsley 2013 IEEE International Symposium on Information Theory, 1715-1719, 2013 | 21 | 2013 |