2018 IEEE International Symposium on Information Theory (ISIT) 2018
DOI: 10.1109/isit.2018.8437839
|View full text |Cite
|
Sign up to set email alerts
|

Quadratically Constrained Channels with Causal Adversaries

Abstract: We consider the problem of communication over a channel with a causal jamming adversary subject to quadratic constraints. A sender Alice wishes to communicate a message to a receiver Bob by transmitting a real-valued length-n codeword x = (x 1 , . . . , x n ) through a communication channel. Alice and Bob do not share common randomness. Knowing Alice's encoding strategy, a jammer James chooses a real-valued length-n adversarial noise sequence s = (s 1 , . . . , s n ) in a causal manner: each s t (1 ≤ t ≤ n) ca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 7 publications
(13 citation statements)
references
References 23 publications
0
13
0
Order By: Relevance
“…10a). The z-aware attack is novel in the context of myopic channels, but is also inspired by similar ideas in [26].…”
Section: B Proof Techniques For Converse Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…10a). The z-aware attack is novel in the context of myopic channels, but is also inspired by similar ideas in [26].…”
Section: B Proof Techniques For Converse Resultsmentioning
confidence: 99%
“…Remark X.6. The argument above subsumes one way to prove the Plotkin bound (via the Cauchy-Schwarz inequality -see, say, Li et al [26]) with the additional randomness in s z .…”
Section: No Common Randomnessmentioning
confidence: 91%
See 3 more Smart Citations