<?xml version="1.0"?>
<dblpperson name="Dennis Goeckel" pid="77/910" n="223">
<person key="homepages/77/910" mdate="2019-10-14">
<author pid="77/910">Dennis Goeckel</author>
<author pid="77/910">Dennis L. Goeckel</author>
<url>https://orcid.org/0000-0002-4190-9515</url>
</person>
<r><article key="journals/network/EsmatLG26" mdate="2026-03-25">
<author orcid="0000-0002-4880-3238" pid="199/0908">Haitham H. Esmat</author>
<author orcid="0000-0002-0721-0137" pid="58/7964">Beatriz Lorenzo</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Multi-RAT Network Slicing for Heterogeneous MEC-Enabled Internet of Things.</title>
<year>2026</year>
<month>March</month>
<pages>218-229</pages>
<volume>40</volume>
<journal>IEEE Netw.</journal>
<number>2</number>
<ee>https://doi.org/10.1109/MNET.2025.3572464</ee>
<url>db/journals/network/network40.html#EsmatLG26</url>
<stream>streams/journals/network</stream>
</article>
</r>
<r><article key="journals/twc/LiuELG25" mdate="2025-04-01">
<author orcid="0000-0001-7958-0981" pid="42/6759">Xiaofan Liu</author>
<author orcid="0000-0002-4880-3238" pid="199/0908">Haitham H. Esmat</author>
<author orcid="0000-0002-0721-0137" pid="58/7964">Beatriz Lorenzo</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Dynamic and Distributed Probing for Covert Cognitive Mobile Edge Computing Networks.</title>
<pages>2435-2450</pages>
<year>2025</year>
<month>March</month>
<volume>24</volume>
<journal>IEEE Trans. Wirel. Commun.</journal>
<number>3</number>
<ee>https://doi.org/10.1109/TWC.2024.3521303</ee>
<url>db/journals/twc/twc24.html#LiuELG25</url>
<stream>streams/journals/twc</stream>
</article>
</r>
<r><inproceedings key="conf/ciss/GillaniLGDG25" mdate="2025-09-06">
<author pid="278/1497">Amna Gillani</author>
<author orcid="0000-0002-0721-0137" pid="58/7964">Beatriz Lorenzo</author>
<author pid="78/4129">Majid Ghaderi</author>
<author pid="33/8959">Fikadu T. Dagefu</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Optimal Link Configuration for Covert Heterogeneous Wireless Networks with Power Constraints.</title>
<pages>1-6</pages>
<year>2025</year>
<booktitle>CISS</booktitle>
<ee>https://doi.org/10.1109/CISS64860.2025.10944747</ee>
<crossref>conf/ciss/2025</crossref>
<url>db/conf/ciss/ciss2025.html#GillaniLGDG25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ciss/GuanG25" mdate="2025-12-15">
<author pid="50/1147-1">Bo Guan 0001</author>
<author pid="77/910">Dennis L. Goeckel</author>
<title>Channel Decoding from Multiple Looks Under Receiver Impairments.</title>
<pages>1-6</pages>
<year>2025</year>
<booktitle>CISS</booktitle>
<ee>https://doi.org/10.1109/CISS64860.2025.10944726</ee>
<crossref>conf/ciss/2025</crossref>
<url>db/conf/ciss/ciss2025.html#GuanG25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ciss/StaatDSPFG25" mdate="2025-07-25">
<author pid="276/5458">Paul Staat</author>
<author pid="98/4349">Meik D&#246;rpinghaus</author>
<author pid="73/11343">Azadeh Sheikholeslami</author>
<author pid="p/ChristofPaar">Christof Paar</author>
<author pid="f/GFettweis">Gerhard P. Fettweis</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Key Exchange in the Quantum Era: Evaluating a Hybrid System of Public-Key Cryptography and Physical-Layer Security.</title>
<pages>1-6</pages>
<year>2025</year>
<booktitle>CISS</booktitle>
<ee>https://doi.org/10.1109/CISS64860.2025.10944740</ee>
<crossref>conf/ciss/2025</crossref>
<url>db/conf/ciss/ciss2025.html#StaatDSPFG25</url>
</inproceedings>
</r>
<r><article key="journals/wcl/DotyJG24" mdate="2024-04-01">
<author orcid="0009-0000-7689-7123" pid="370/9419">James M. Doty</author>
<author orcid="0000-0001-9170-0114" pid="90/10179">Robert W. Jackson</author>
<author orcid="0000-0002-4190-9515" pid="77/910">Dennis L. Goeckel</author>
<title>Analog Cancellation of a Known Remote Interference: Hardware Realization and Analysis.</title>
<pages>829-833</pages>
<year>2024</year>
<month>March</month>
<volume>13</volume>
<journal>IEEE Wirel. Commun. Lett.</journal>
<number>3</number>
<ee>https://doi.org/10.1109/LWC.2023.3346290</ee>
<url>db/journals/wcl/wcl13.html#DotyJG24</url>
</article>
</r>
<r><inproceedings key="conf/ciss/GuanWHPG24" mdate="2025-12-15">
<author pid="50/1147-1">Bo Guan 0001</author>
<author pid="04/1738">Shuangqing Wei</author>
<author pid="22/1797">Amir Houmansadr</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Optimal Obfuscation to Protect Client Privacy in Federated Learning.</title>
<pages>1-6</pages>
<year>2024</year>
<booktitle>CISS</booktitle>
<ee>https://doi.org/10.1109/CISS59072.2024.10480208</ee>
<crossref>conf/ciss/2024</crossref>
<url>db/conf/ciss/ciss2024.html#GuanWHPG24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vtc/XiaELG24" mdate="2025-12-07">
<author pid="318/4598">Xiaohao Xia</author>
<author pid="199/0908">Haitham H. Esmat</author>
<author orcid="0000-0002-0721-0137" pid="58/7964">Beatriz Lorenzo</author>
<author pid="77/910">Dennis Goeckel</author>
<title>UAV-Enabled Covert Cross-Technology Communication in Heterogeneous IoT Networks.</title>
<pages>1-7</pages>
<year>2024</year>
<booktitle>VTC Fall</booktitle>
<ee>https://doi.org/10.1109/VTC2024-Fall63153.2024.10757651</ee>
<crossref>conf/vtc/2024f</crossref>
<url>db/conf/vtc/vtc2024f.html#XiaELG24</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2407-13898" mdate="2024-08-22">
<author pid="267/7626">Amir Reza Ramtin</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="t/DonaldFTowsley">Don Towsley</author>
<title>Fundamental Scaling Laws of Covert Communication in the Presence of Block Fading.</title>
<year>2024</year>
<volume>abs/2407.13898</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2407.13898</ee>
<url>db/journals/corr/corr2407.html#abs-2407-13898</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2412-07059" mdate="2025-01-26">
<author pid="278/1497">Amna Gillani</author>
<author pid="58/7964">Beatriz Lorenzo</author>
<author pid="78/4129">Majid Ghaderi</author>
<author pid="33/8959">Fikadu T. Dagefu</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Optimal Routing and Link Configuration for Covert Heterogeneous Wireless Networks.</title>
<year>2024</year>
<volume>abs/2412.07059</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2412.07059</ee>
<url>db/journals/corr/corr2412.html#abs-2412-07059</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2412-13352" mdate="2025-01-21">
<author pid="276/5458">Paul Staat</author>
<author pid="98/4349">Meik D&#246;rpinghaus</author>
<author pid="73/11343">Azadeh Sheikholeslami</author>
<author pid="p/ChristofPaar">Christof Paar</author>
<author pid="f/GFettweis">Gerhard P. Fettweis</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Key Exchange in the Quantum Era: Evaluating a Hybrid System of Public-Key Cryptography and Physical-Layer Security.</title>
<year>2024</year>
<volume>abs/2412.13352</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2412.13352</ee>
<url>db/journals/corr/corr2412.html#abs-2412-13352</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article key="journals/iotj/EnayatiGHP23" mdate="2023-12-10">
<author orcid="0000-0002-8509-9606" pid="178/3880">Saeede Enayati</author>
<author orcid="0000-0002-4190-9515" pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7553-6657" pid="22/1797">Amir Houmansadr</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<title>Location Privacy Protection for UAVs in Package Delivery and IoT Data Collection.</title>
<pages>20586-20601</pages>
<year>2023</year>
<month>dec1</month>
<volume>10</volume>
<journal>IEEE Internet Things J.</journal>
<number>23</number>
<ee>https://doi.org/10.1109/JIOT.2023.3293755</ee>
<url>db/journals/iotj/iotj10.html#EnayatiGHP23</url>
</article>
</r>
<r><article key="journals/tdsc/BozorgiBRGHSGT23" mdate="2023-09-24">
<author orcid="0000-0003-3056-4758" pid="356/5437">Ardavan Bozorgi</author>
<author pid="225/5499">Alireza Bahramali</author>
<author pid="85/10059">Fatemeh Rezaei</author>
<author pid="248/1723">Amirhossein Ghafari</author>
<author orcid="0000-0002-7553-6657" pid="22/1797">Amir Houmansadr</author>
<author pid="178/5177">Ramin Soltani</author>
<author orcid="0000-0002-4190-9515" pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<title>I Still Know What You Did Last Summer: Inferring Sensitive User Activities on Messaging Applications Through Traffic Analysis.</title>
<pages>4135-4153</pages>
<year>2023</year>
<month>September - October</month>
<volume>20</volume>
<journal>IEEE Trans. Dependable Secur. Comput.</journal>
<number>5</number>
<ee>https://doi.org/10.1109/TDSC.2022.3218191</ee>
<url>db/journals/tdsc/tdsc20.html#BozorgiBRGHSGT23</url>
</article>
</r>
<r><inproceedings key="conf/acssc/GillaniSTG23" mdate="2024-04-09">
<author pid="278/1497">Amna Gillani</author>
<author pid="176/8109">Tamara V. Sobers</author>
<author pid="t/DonaldFTowsley">Don Towsley</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Covert Communications Under Environmental Uncertainty on a Continuous-Time Channel.</title>
<pages>248-252</pages>
<year>2023</year>
<booktitle>ACSSC</booktitle>
<ee>https://doi.org/10.1109/IEEECONF59524.2023.10476936</ee>
<crossref>conf/acssc/2023</crossref>
<url>db/conf/acssc/acssc2023.html#GillaniSTG23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/milcom/LiuLG23" mdate="2024-03-08">
<author pid="36/677">X. Liu</author>
<author pid="58/7964">Beatriz Lorenzo</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Covert Communications in Cognitive Mobile Edge Computing Networks using Restless Multi-Armed Bandits.</title>
<pages>311-318</pages>
<year>2023</year>
<booktitle>MILCOM</booktitle>
<ee>https://doi.org/10.1109/MILCOM58377.2023.10356293</ee>
<crossref>conf/milcom/2023</crossref>
<url>db/conf/milcom/milcom2023.html#LiuLG23</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2307-08195" mdate="2023-07-25">
<author pid="352/3911">Ali Mohammadi Teshnizi</author>
<author pid="78/4129">Majid Ghaderi</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Covert Communication in Autoencoder Wireless Systems.</title>
<year>2023</year>
<volume>abs/2307.08195</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2307.08195</ee>
<url>db/journals/corr/corr2307.html#abs-2307-08195</url>
</article>
</r>
<r><article key="journals/iotj/GuanTGHP22" mdate="2025-12-14">
<author orcid="0000-0002-0229-7317" pid="50/1147-1">Bo Guan 0001</author>
<author orcid="0000-0002-3469-4157" pid="199/8925">Nazanin Takbiri</author>
<author orcid="0000-0002-4190-9515" pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7553-6657" pid="22/1797">Amir Houmansadr</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<title>Superstring-Based Sequence Obfuscation to Thwart Pattern Matching Attacks.</title>
<pages>23348-23365</pages>
<year>2022</year>
<volume>9</volume>
<journal>IEEE Internet Things J.</journal>
<number>23</number>
<ee>https://doi.org/10.1109/JIOT.2022.3203995</ee>
<url>db/journals/iotj/iotj9.html#GuanTGHP22</url>
</article>
</r>
<r><article key="journals/tmc/SheikholeslamiG22" mdate="2022-05-18">
<author pid="73/11343">Azadeh Sheikholeslami</author>
<author orcid="0000-0002-3783-4346" pid="78/4129">Majid Ghaderi</author>
<author orcid="0000-0002-4190-9515" pid="77/910">Dennis Goeckel</author>
<title>Covert Communications in Multi-Channel Slotted ALOHA Systems.</title>
<pages>1958-1971</pages>
<year>2022</year>
<volume>21</volume>
<journal>IEEE Trans. Mob. Comput.</journal>
<number>6</number>
<ee>https://doi.org/10.1109/TMC.2020.3036022</ee>
<url>db/journals/tmc/tmc21.html#SheikholeslamiG22</url>
</article>
</r>
<r><article key="journals/twc/LiSTG22" mdate="2025-08-26">
<author orcid="0000-0001-8919-5681" pid="75/6627-46">Ke Li 0046</author>
<author pid="176/8109">Tamara V. Sobers</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<author orcid="0000-0002-4190-9515" pid="77/910">Dennis Goeckel</author>
<title>Covert Communication in Continuous-Time Systems in the Presence of a Jammer.</title>
<pages>4883-4897</pages>
<year>2022</year>
<volume>21</volume>
<journal>IEEE Trans. Wirel. Commun.</journal>
<number>7</number>
<ee>https://doi.org/10.1109/TWC.2021.3134179</ee>
<url>db/journals/twc/twc21.html#LiSTG22</url>
</article>
</r>
<r><inproceedings key="conf/isit/EnayatiGHP22" mdate="2022-08-08">
<author pid="178/3880">Saeede Enayati</author>
<author pid="77/910">Dennis L. Goeckel</author>
<author pid="22/1797">Amir Houmansadr</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<title>Constrained Obfuscation to Thwart Pattern Matching Attacks.</title>
<pages>643-648</pages>
<year>2022</year>
<booktitle>ISIT</booktitle>
<ee>https://doi.org/10.1109/ISIT50566.2022.9834792</ee>
<crossref>conf/isit/2022</crossref>
<url>db/conf/isit/isit2022.html#EnayatiGHP22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isncc/EnayatiGHP22" mdate="2022-08-24">
<author pid="178/3880">Saeede Enayati</author>
<author pid="77/910">Dennis L. Goeckel</author>
<author pid="22/1797">Amir Houmansadr</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<title>Privacy-Preserving Path-Planning for UAVs.</title>
<pages>1-6</pages>
<year>2022</year>
<booktitle>ISNCC</booktitle>
<ee>https://doi.org/10.1109/ISNCC55209.2022.9851770</ee>
<crossref>conf/isncc/2022</crossref>
<url>db/conf/isncc/isncc2022.html#EnayatiGHP22</url>
</inproceedings>
</r>
<r><article key="journals/icl/TakbiriCGHP21" mdate="2021-09-16">
<author orcid="0000-0002-3469-4157" pid="199/8925">Nazanin Takbiri</author>
<author orcid="0000-0003-3424-054X" pid="270/2181">Minting Chen</author>
<author orcid="0000-0002-4190-9515" pid="77/910">Dennis L. Goeckel</author>
<author orcid="0000-0002-7553-6657" pid="22/1797">Amir Houmansadr</author>
<author orcid="0000-0002-7249-2548" pid="72/4747">Hossein Pishro-Nik</author>
<title>Asymptotic Privacy Loss Due to Time Series Matching of Dependent Users.</title>
<pages>1079-1083</pages>
<year>2021</year>
<volume>25</volume>
<journal>IEEE Commun. Lett.</journal>
<number>4</number>
<ee>https://doi.org/10.1109/LCOMM.2020.3043722</ee>
<url>db/journals/icl/icl25.html#TakbiriCGHP21</url>
</article>
</r>
<r><article key="journals/tvt/ForouzeshAMG21" mdate="2021-09-16">
<author orcid="0000-0002-3559-5994" pid="211/5954">Moslem Forouzesh</author>
<author orcid="0000-0001-9736-3462" pid="64/3376">Paeiz Azmi</author>
<author orcid="0000-0001-5364-8888" pid="31/8209">Nader Mokari</author>
<author orcid="0000-0002-4190-9515" pid="77/910">Dennis Goeckel</author>
<title>Robust Power Allocation in Covert Communication: Imperfect CDI.</title>
<pages>5789-5802</pages>
<year>2021</year>
<volume>70</volume>
<journal>IEEE Trans. Veh. Technol.</journal>
<number>6</number>
<ee>https://doi.org/10.1109/TVT.2021.3076709</ee>
<url>db/journals/tvt/tvt70.html#ForouzeshAMG21</url>
</article>
</r>
<r><inproceedings key="conf/ccs/BahramaliNHGT21" mdate="2023-06-26">
<author pid="225/5499">Alireza Bahramali</author>
<author pid="187/8997">Milad Nasr</author>
<author pid="22/1797">Amir Houmansadr</author>
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<title>Robust Adversarial Attacks Against DNN-Based Wireless Communication Systems.</title>
<pages>126-140</pages>
<year>2021</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3460120.3484777</ee>
<crossref>conf/ccs/2021</crossref>
<url>db/conf/ccs/ccs2021.html#BahramaliNHGT21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/globecom/LiGG21" mdate="2025-08-27">
<author pid="75/6627-46">Ke Li 0046</author>
<author pid="78/4129">Majid Ghaderi</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Fundamental Limits of Activity-Based Covert Channels.</title>
<pages>1-6</pages>
<year>2021</year>
<booktitle>GLOBECOM</booktitle>
<ee>https://doi.org/10.1109/GLOBECOM46510.2021.9686016</ee>
<crossref>conf/globecom/2021</crossref>
<url>db/conf/globecom/globecom2021.html#LiGG21</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2102-00918" mdate="2021-02-09">
<author pid="225/5499">Alireza Bahramali</author>
<author pid="187/8997">Milad Nasr</author>
<author pid="22/1797">Amir Houmansadr</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="t/DonaldFTowsley">Don Towsley</author>
<title>Robust Adversarial Attacks Against DNN-Based Wireless Communication Systems.</title>
<year>2021</year>
<volume>abs/2102.00918</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2102.00918</ee>
<url>db/journals/corr/corr2102.html#abs-2102-00918</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2108-12336" mdate="2025-12-15">
<author pid="50/1147-1">Bo Guan 0001</author>
<author pid="199/8925">Nazanin Takbiri</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="22/1797">Amir Houmansadr</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<title>Superstring-Based Sequence Obfuscation to Thwart Pattern Matching Attacks.</title>
<year>2021</year>
<volume>abs/2108.12336</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2108.12336</ee>
<url>db/journals/corr/corr2108.html#abs-2108-12336</url>
</article>
</r>
<r><article key="journals/tcom/SoltaniGTH20" mdate="2020-09-01">
<author orcid="0000-0002-5157-5475" pid="178/5177">Ramin Soltani</author>
<author orcid="0000-0002-4190-9515" pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<author orcid="0000-0002-7553-6657" pid="22/1797">Amir Houmansadr</author>
<title>Fundamental Limits of Covert Packet Insertion.</title>
<pages>3401-3414</pages>
<year>2020</year>
<volume>68</volume>
<journal>IEEE Trans. Commun.</journal>
<number>6</number>
<ee>https://doi.org/10.1109/TCOMM.2020.2980788</ee>
<url>db/journals/tcom/tcom68.html#SoltaniGTH20</url>
</article>
</r>
<r><article key="journals/tifs/SoltaniGTH20" mdate="2020-08-06">
<author orcid="0000-0002-5157-5475" pid="178/5177">Ramin Soltani</author>
<author orcid="0000-0002-4190-9515" pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<author orcid="0000-0002-7553-6657" pid="22/1797">Amir Houmansadr</author>
<title>Fundamental Limits of Invisible Flow Fingerprinting.</title>
<pages>345-360</pages>
<year>2020</year>
<volume>15</volume>
<journal>IEEE Trans. Inf. Forensics Secur.</journal>
<ee>https://doi.org/10.1109/TIFS.2019.2919870</ee>
<url>db/journals/tifs/tifs15.html#SoltaniGTH20</url>
</article>
</r>
<r><article key="journals/tit/TakbiriHGP20" mdate="2020-12-01">
<author orcid="0000-0002-3469-4157" pid="199/8925">Nazanin Takbiri</author>
<author orcid="0000-0002-7553-6657" pid="22/1797">Amir Houmansadr</author>
<author orcid="0000-0002-4190-9515" pid="77/910">Dennis L. Goeckel</author>
<author orcid="0000-0002-7249-2548" pid="72/4747">Hossein Pishro-Nik</author>
<title>Privacy of Dependent Users Against Statistical Matching.</title>
<pages>5842-5865</pages>
<year>2020</year>
<volume>66</volume>
<journal>IEEE Trans. Inf. Theory</journal>
<number>9</number>
<ee>https://doi.org/10.1109/TIT.2020.2985059</ee>
<url>db/journals/tit/tit66.html#TakbiriHGP20</url>
</article>
</r>
<r><article key="journals/ton/ShifrinMCGG20" mdate="2023-08-28">
<author orcid="0000-0003-0946-5018" pid="10/6671">Mark Shifrin</author>
<author orcid="0000-0002-8953-4003" pid="44/4915">Daniel S. Menasch&#233;</author>
<author orcid="0000-0002-9567-5793" pid="18/1993-1">Asaf Cohen 0001</author>
<author orcid="0000-0002-4190-9515" pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-2685-2856" pid="16/6327">Omer Gurewitz</author>
<title>Optimal PHY Configuration in Wireless Networks.</title>
<pages>2601-2614</pages>
<year>2020</year>
<volume>28</volume>
<journal>IEEE/ACM Trans. Netw.</journal>
<number>6</number>
<ee>https://doi.org/10.1109/TNET.2020.3015881</ee>
<ee>https://www.wikidata.org/entity/Q114568495</ee>
<url>db/journals/ton/ton28.html#ShifrinMCGG20</url>
</article>
</r>
<r><article key="journals/tvt/ForouzeshAMG20" mdate="2020-08-26">
<author orcid="0000-0002-3559-5994" pid="211/5954">Moslem Forouzesh</author>
<author orcid="0000-0001-9736-3462" pid="64/3376">Paeiz Azmi</author>
<author orcid="0000-0001-5364-8888" pid="31/8209">Nader Mokari</author>
<author orcid="0000-0002-4190-9515" pid="77/910">Dennis Goeckel</author>
<title>Covert Communication Using Null Space and 3D Beamforming: Uncertainty of Willie's Location Information.</title>
<pages>8568-8576</pages>
<year>2020</year>
<volume>69</volume>
<journal>IEEE Trans. Veh. Technol.</journal>
<number>8</number>
<ee>https://doi.org/10.1109/TVT.2020.2997074</ee>
<url>db/journals/tvt/tvt69.html#ForouzeshAMG20</url>
</article>
</r>
<r><article key="journals/twc/LiKG20" mdate="2025-08-26">
<author orcid="0000-0001-8919-5681" pid="75/6627-46">Ke Li 0046</author>
<author pid="52/1666">Patrick A. Kelly</author>
<author orcid="0000-0002-4190-9515" pid="77/910">Dennis Goeckel</author>
<title>Optimal Power Adaptation in Covert Communication With an Uninformed Jammer.</title>
<pages>3463-3473</pages>
<year>2020</year>
<volume>19</volume>
<journal>IEEE Trans. Wirel. Commun.</journal>
<number>5</number>
<ee>https://doi.org/10.1109/TWC.2020.2973975</ee>
<url>db/journals/twc/twc19.html#LiKG20</url>
</article>
</r>
<r><article key="journals/wcl/TakbiriSHGP20" mdate="2020-12-31">
<author orcid="0000-0002-3469-4157" pid="199/8925">Nazanin Takbiri</author>
<author orcid="0000-0003-4508-583X" pid="243/3113">Virat Shejwalkar</author>
<author orcid="0000-0002-7553-6657" pid="22/1797">Amir Houmansadr</author>
<author orcid="0000-0002-4190-9515" pid="77/910">Dennis L. Goeckel</author>
<author orcid="0000-0002-7249-2548" pid="72/4747">Hossein Pishro-Nik</author>
<title>Leveraging Prior Knowledge Asymmetries in the Design of Location Privacy-Preserving Mechanisms.</title>
<pages>2005-2009</pages>
<year>2020</year>
<volume>9</volume>
<journal>IEEE Wirel. Commun. Lett.</journal>
<number>11</number>
<ee>https://doi.org/10.1109/LWC.2020.3011361</ee>
<url>db/journals/wcl/wcl9.html#TakbiriSHGP20</url>
</article>
</r>
<r><inproceedings key="conf/isit/GuanTGHP20" mdate="2025-12-15">
<author pid="50/1147-1">Bo Guan 0001</author>
<author pid="199/8925">Nazanin Takbiri</author>
<author pid="77/910">Dennis L. Goeckel</author>
<author pid="22/1797">Amir Houmansadr</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<title>Sequence Obfuscation to Thwart Pattern Matching Attacks.</title>
<pages>884-889</pages>
<year>2020</year>
<booktitle>ISIT</booktitle>
<ee>https://doi.org/10.1109/ISIT44484.2020.9174069</ee>
<crossref>conf/isit/2020</crossref>
<url>db/conf/isit/isit2020.html#GuanTGHP20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ndss/BahramaliHSGT20" mdate="2021-02-01">
<author pid="225/5499">Alireza Bahramali</author>
<author pid="22/1797">Amir Houmansadr</author>
<author pid="178/5177">Ramin Soltani</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="t/DonaldFTowsley">Don Towsley</author>
<title>Practical Traffic Analysis Attacks on Secure Messaging Applications.</title>
<year>2020</year>
<booktitle>NDSS</booktitle>
<ee type="oa">https://www.ndss-symposium.org/ndss-paper/practical-traffic-analysis-attacks-on-secure-messaging-applications/</ee>
<crossref>conf/ndss/2020</crossref>
<url>db/conf/ndss/ndss2020.html#BahramaliHSGT20</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2001-06932" mdate="2025-08-27">
<author pid="75/6627-46">Ke Li 0046</author>
<author pid="t/DonaldFTowsley">Don Towsley</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Covert Communication in Continuous-Time Systems.</title>
<year>2020</year>
<volume>abs/2001.06932</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2001.06932</ee>
<url>db/journals/corr/corr2001.html#abs-2001-06932</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2005-00508" mdate="2020-05-08">
<author pid="225/5499">Alireza Bahramali</author>
<author pid="178/5177">Ramin Soltani</author>
<author pid="22/1797">Amir Houmansadr</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="t/DonaldFTowsley">Don Towsley</author>
<title>Practical Traffic Analysis Attacks on Secure Messaging Applications.</title>
<year>2020</year>
<volume>abs/2005.00508</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2005.00508</ee>
<url>db/journals/corr/corr2005.html#abs-2005-00508</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2007-06119" mdate="2020-07-21">
<author pid="199/8925">Nazanin Takbiri</author>
<author pid="270/2181">Minting Chen</author>
<author pid="77/910">Dennis L. Goeckel</author>
<author pid="22/1797">Amir Houmansadr</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<title>Asymptotic Privacy Loss due to Time Series Matching of Dependent Users.</title>
<year>2020</year>
<volume>abs/2007.06119</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2007.06119</ee>
<url>db/journals/corr/corr2007.html#abs-2007-06119</url>
</article>
</r>
<r><article key="journals/tit/TakbiriHGP19" mdate="2025-01-19">
<author orcid="0000-0002-3469-4157" pid="199/8925">Nazanin Takbiri</author>
<author orcid="0000-0002-7553-6657" pid="22/1797">Amir Houmansadr</author>
<author orcid="0000-0002-4190-9515" pid="77/910">Dennis L. Goeckel</author>
<author orcid="0000-0002-7249-2548" pid="72/4747">Hossein Pishro-Nik</author>
<title>Matching Anonymized and Obfuscated Time Series to Users' Profiles.</title>
<pages>724-741</pages>
<year>2019</year>
<volume>65</volume>
<journal>IEEE Trans. Inf. Theory</journal>
<number>2</number>
<ee>https://doi.org/10.1109/TIT.2018.2873134</ee>
<ee>https://www.wikidata.org/entity/Q129156171</ee>
<url>db/journals/tit/tit65.html#TakbiriHGP19</url>
</article>
</r>
<r><inproceedings key="conf/acsac/ShejwalkarHPG19" mdate="2025-01-19">
<author pid="243/3113">Virat Shejwalkar</author>
<author pid="22/1797">Amir Houmansadr</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Revisiting utility metrics for location privacy-preserving mechanisms.</title>
<pages>313-327</pages>
<year>2019</year>
<booktitle>ACSAC</booktitle>
<ee>https://doi.org/10.1145/3359789.3359829</ee>
<ee>https://www.wikidata.org/entity/Q130904884</ee>
<crossref>conf/acsac/2019</crossref>
<url>db/conf/acsac/acsac2019.html#ShejwalkarHPG19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ciss/TakbiriGHP19" mdate="2019-04-24">
<author pid="199/8925">Nazanin Takbiri</author>
<author pid="77/910">Dennis L. Goeckel</author>
<author pid="22/1797">Amir Houmansadr</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<title>Asymptotic Limits of Privacy in Bayesian Time Series Matching.</title>
<pages>1-6</pages>
<year>2019</year>
<booktitle>CISS</booktitle>
<ee>https://doi.org/10.1109/CISS.2019.8692936</ee>
<crossref>conf/ciss/2019</crossref>
<url>db/conf/ciss/ciss2019.html#TakbiriGHP19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icc/YanHCG19" mdate="2019-10-19">
<author orcid="0000-0002-4586-1926" pid="19/11269">Shihao Yan</author>
<author orcid="0000-0002-0524-9927" pid="25/3433">Stephen V. Hanly</author>
<author orcid="0000-0002-4857-2601" pid="07/3441">Iain B. Collings</author>
<author pid="77/910">Dennis L. Goeckel</author>
<title>Hiding Unmanned Aerial Vehicles for Wireless Transmissions by Covert Communications.</title>
<pages>1-6</pages>
<year>2019</year>
<booktitle>ICC</booktitle>
<ee>https://doi.org/10.1109/ICC.2019.8761271</ee>
<crossref>conf/icc/2019</crossref>
<url>db/conf/icc/icc2019.html#YanHCG19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/milcom/GuanG19" mdate="2025-12-15">
<author pid="50/1147-1">Bo Guan 0001</author>
<author pid="77/910">Dennis L. Goeckel</author>
<title>Achievable Information-Theoretic Secrecy in the Presence of a Radar.</title>
<pages>476-481</pages>
<year>2019</year>
<booktitle>MILCOM</booktitle>
<ee>https://doi.org/10.1109/MILCOM47813.2019.9020731</ee>
<crossref>conf/milcom/2019</crossref>
<url>db/conf/milcom/milcom2019.html#GuanG19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wcnc/SheikholeslamiG19" mdate="2019-11-06">
<author pid="73/11343">Azadeh Sheikholeslami</author>
<author pid="78/4129">Majid Ghaderi</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Covert Communications in Packet Collision Channels.</title>
<pages>1-6</pages>
<year>2019</year>
<booktitle>WCNC</booktitle>
<ee>https://doi.org/10.1109/WCNC.2019.8886068</ee>
<crossref>conf/wcnc/2019</crossref>
<url>db/conf/wcnc/wcnc2019.html#SheikholeslamiG19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wcnc/TakbiriSGHP19" mdate="2020-03-27">
<author pid="199/8925">Nazanin Takbiri</author>
<author orcid="0000-0002-5157-5475" pid="178/5177">Ramin Soltani</author>
<author pid="77/910">Dennis L. Goeckel</author>
<author pid="22/1797">Amir Houmansadr</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<title>Asymptotic Loss in Privacy due to Dependency in Gaussian Traces.</title>
<pages>1-6</pages>
<year>2019</year>
<booktitle>WCNC</booktitle>
<ee>https://doi.org/10.1109/WCNC.2019.8885436</ee>
<crossref>conf/wcnc/2019</crossref>
<url>db/conf/wcnc/wcnc2019.html#TakbiriSGHP19</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-1902-06404" mdate="2019-05-21">
<author pid="199/8925">Nazanin Takbiri</author>
<author pid="77/910">Dennis L. Goeckel</author>
<author pid="22/1797">Amir Houmansadr</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<title>Asymptotic Limits of Privacy in Bayesian Time Series Matching.</title>
<year>2019</year>
<volume>abs/1902.06404</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1902.06404</ee>
<url>db/journals/corr/corr1902.html#abs-1902-06404</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1903-11640" mdate="2019-04-02">
<author pid="178/5177">Ramin Soltani</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="t/DonaldFTowsley">Don Towsley</author>
<author pid="22/1797">Amir Houmansadr</author>
<title>Fundamental Limits of Covert Packet Insertion.</title>
<year>2019</year>
<volume>abs/1903.11640</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1903.11640</ee>
<url>db/journals/corr/corr1903.html#abs-1903-11640</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1912-02209" mdate="2020-01-02">
<author pid="199/8925">Nazanin Takbiri</author>
<author pid="243/3113">Virat Shejwalkar</author>
<author pid="22/1797">Amir Houmansadr</author>
<author pid="77/910">Dennis L. Goeckel</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<title>Leveraging Prior Knowledge Asymmetries in the Design of Location Privacy-Preserving Mechanisms.</title>
<year>2019</year>
<volume>abs/1912.02209</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1912.02209</ee>
<url>db/journals/corr/corr1912.html#abs-1912-02209</url>
</article>
</r>
<r><article key="journals/dcan/PolakWDJG18" mdate="2022-07-11">
<author pid="19/10031">Adam C. Polak</author>
<author pid="45/5522">Mark Wagner</author>
<author pid="157/8095">Marco F. Duarte</author>
<author pid="90/10179">Robert W. Jackson</author>
<author pid="77/910">Dennis L. Goeckel</author>
<title>Mitigation of spectral leakage for single carrier, block-processing cognitive radio receivers.</title>
<pages>106-110</pages>
<year>2018</year>
<volume>4</volume>
<journal>Digit. Commun. Networks</journal>
<number>2</number>
<ee type="oa">https://doi.org/10.1016/j.dcan.2017.04.001</ee>
<url>db/journals/dcan/dcan4.html#PolakWDJG18</url>
</article>
</r>
<r><article key="journals/twc/SheikholeslamiG18" mdate="2025-01-19">
<author orcid="0000-0003-0839-6428" pid="73/11343">Azadeh Sheikholeslami</author>
<author pid="78/4129">Majid Ghaderi</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<author orcid="0000-0002-1205-3906" pid="59/4744">Boulat A. Bash</author>
<author pid="42/5459-1">Saikat Guha 0001</author>
<author orcid="0000-0002-4190-9515" pid="77/910">Dennis Goeckel</author>
<title>Multi-Hop Routing in Covert Wireless Networks.</title>
<pages>3656-3669</pages>
<year>2018</year>
<volume>17</volume>
<journal>IEEE Trans. Wirel. Commun.</journal>
<number>6</number>
<ee>https://doi.org/10.1109/TWC.2018.2812881</ee>
<ee>https://www.wikidata.org/entity/Q130182672</ee>
<url>db/journals/twc/twc17.html#SheikholeslamiG18</url>
</article>
</r>
<r><article key="journals/twc/SoltaniGTBG18" mdate="2025-01-19">
<author orcid="0000-0002-5157-5475" pid="178/5177">Ramin Soltani</author>
<author orcid="0000-0002-4190-9515" pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<author orcid="0000-0002-1205-3906" pid="59/4744">Boulat A. Bash</author>
<author pid="42/5459-1">Saikat Guha 0001</author>
<title>Covert Wireless Communication With Artificial Noise Generation.</title>
<pages>7252-7267</pages>
<year>2018</year>
<volume>17</volume>
<journal>IEEE Trans. Wirel. Commun.</journal>
<number>11</number>
<ee>https://doi.org/10.1109/TWC.2018.2865946</ee>
<ee>https://www.wikidata.org/entity/Q129340333</ee>
<url>db/journals/twc/twc17.html#SoltaniGTBG18</url>
</article>
</r>
<r><inproceedings key="conf/acssc/LiPG18" mdate="2025-08-27">
<author pid="75/6627-46">Ke Li 0046</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<author pid="77/910">Dennis L. Goeckel</author>
<title>Fundamental Limits in Detecting Whether a Signal Has Been Quantized.</title>
<pages>1699-1703</pages>
<year>2018</year>
<booktitle>ACSSC</booktitle>
<ee>https://doi.org/10.1109/ACSSC.2018.8645253</ee>
<crossref>conf/acssc/2018</crossref>
<url>db/conf/acssc/acssc2018.html#LiPG18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/allerton/SoltaniGTH18" mdate="2023-06-26">
<author orcid="0000-0002-5157-5475" pid="178/5177">Ramin Soltani</author>
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<author pid="22/1797">Amir Houmansadr</author>
<title>Fundamental Limits of Covert Bit Insertion in Packets.</title>
<pages>1065-1072</pages>
<year>2018</year>
<booktitle>Allerton</booktitle>
<ee>https://doi.org/10.1109/ALLERTON.2018.8635975</ee>
<crossref>conf/allerton/2018</crossref>
<url>db/conf/allerton/allerton2018.html#SoltaniGTH18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ciss/LiPG18" mdate="2025-08-27">
<author pid="75/6627-46">Ke Li 0046</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<author pid="77/910">Dennis L. Goeckel</author>
<title>Privacy against matching under anonymization and obfuscation in the Gaussian case.</title>
<pages>1-6</pages>
<year>2018</year>
<booktitle>CISS</booktitle>
<ee>https://doi.org/10.1109/CISS.2018.8362258</ee>
<crossref>conf/ciss/2018</crossref>
<url>db/conf/ciss/ciss2018.html#LiPG18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ciss/TakbiriLPG18" mdate="2025-08-27">
<author pid="199/8925">Nazanin Takbiri</author>
<author pid="75/6627-46">Ke Li 0046</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<author pid="77/910">Dennis L. Goeckel</author>
<title>Statistical matching in the presence of anonymization and obfuscation: Non-asymptotic results in the discrete case.</title>
<pages>1-6</pages>
<year>2018</year>
<booktitle>CISS</booktitle>
<ee>https://doi.org/10.1109/CISS.2018.8362250</ee>
<crossref>conf/ciss/2018</crossref>
<url>db/conf/ciss/ciss2018.html#TakbiriLPG18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isit/TakbiriHGP18" mdate="2018-08-21">
<author pid="199/8925">Nazanin Takbiri</author>
<author pid="22/1797">Amir Houmansadr</author>
<author pid="77/910">Dennis L. Goeckel</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<title>Privacy Against Statistical Matching: Inter-User Correlation.</title>
<pages>1036-1040</pages>
<year>2018</year>
<booktitle>ISIT</booktitle>
<ee>https://doi.org/10.1109/ISIT.2018.8437352</ee>
<crossref>conf/isit/2018</crossref>
<url>db/conf/isit/isit2018.html#TakbiriHGP18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/spawc/GoeckelSSBTG18" mdate="2024-08-04">
<author pid="77/910">Dennis Goeckel</author>
<author pid="73/11343">Azadeh Sheikholeslami</author>
<author pid="176/8109">Tamara V. Sobers</author>
<author orcid="0000-0002-1205-3906" pid="59/4744">Boulat A. Bash</author>
<author pid="t/DonaldFTowsley">Don Towsley</author>
<author pid="42/5459-1">Saikat Guha 0001</author>
<title>Covert Communications in a Dynamic Interference Environment.</title>
<pages>1-5</pages>
<year>2018</year>
<booktitle>SPAWC</booktitle>
<ee>https://doi.org/10.1109/SPAWC.2018.8445896</ee>
<crossref>conf/spawc/2018</crossref>
<url>db/conf/spawc/spawc2018.html#GoeckelSSBTG18</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-1803-04100" mdate="2022-04-08">
<author pid="73/11343">Azadeh Sheikholeslami</author>
<author pid="78/4129">Majid Ghaderi</author>
<author pid="t/DonaldFTowsley">Don Towsley</author>
<author pid="59/4744">Boulat A. Bash</author>
<author pid="42/5459-1">Saikat Guha 0001</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Multi-Hop Routing in Covert Wireless Networks.</title>
<year>2018</year>
<volume>abs/1803.04100</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1803.04100</ee>
<url>db/journals/corr/corr1803.html#abs-1803-04100</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1805-01296" mdate="2018-08-13">
<author pid="199/8925">Nazanin Takbiri</author>
<author pid="22/1797">Amir Houmansadr</author>
<author pid="77/910">Dennis L. Goeckel</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<title>Privacy against Statistical Matching: Inter-User Correlation.</title>
<year>2018</year>
<volume>abs/1805.01296</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1805.01296</ee>
<url>db/journals/corr/corr1805.html#abs-1805-01296</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1806-11108" mdate="2018-08-13">
<author pid="199/8925">Nazanin Takbiri</author>
<author pid="22/1797">Amir Houmansadr</author>
<author pid="77/910">Dennis L. Goeckel</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<title>Privacy of Dependent Users Against Statistical Matching.</title>
<year>2018</year>
<volume>abs/1806.11108</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1806.11108</ee>
<url>db/journals/corr/corr1806.html#abs-1806-11108</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1809-08514" mdate="2018-10-05">
<author pid="178/5177">Ramin Soltani</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="t/DonaldFTowsley">Don Towsley</author>
<author pid="22/1797">Amir Houmansadr</author>
<title>Fundamental Limits of Invisible Flow Fingerprinting.</title>
<year>2018</year>
<volume>abs/1809.08514</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1809.08514</ee>
<url>db/journals/corr/corr1809.html#abs-1809-08514</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1809-10289" mdate="2018-10-05">
<author pid="199/8925">Nazanin Takbiri</author>
<author pid="178/5177">Ramin Soltani</author>
<author pid="77/910">Dennis L. Goeckel</author>
<author pid="22/1797">Amir Houmansadr</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<title>Asymptotic Loss in Privacy due to Dependency in Gaussian Traces.</title>
<year>2018</year>
<volume>abs/1809.10289</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1809.10289</ee>
<url>db/journals/corr/corr1809.html#abs-1809-10289</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1810-03510" mdate="2018-10-30">
<author pid="178/5177">Ramin Soltani</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="t/DonaldFTowsley">Don Towsley</author>
<author pid="22/1797">Amir Houmansadr</author>
<title>Fundamental Limits of Covert Bit Insertion in Packets.</title>
<year>2018</year>
<volume>abs/1810.03510</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1810.03510</ee>
<url>db/journals/corr/corr1810.html#abs-1810-03510</url>
</article>
</r>
<r><article key="journals/tcom/SheikholeslamiG17" mdate="2020-09-01">
<author orcid="0000-0003-0839-6428" pid="73/11343">Azadeh Sheikholeslami</author>
<author pid="78/4129">Majid Ghaderi</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Energy-Efficient Secrecy in Wireless Networks Based on Random Jamming.</title>
<pages>2522-2533</pages>
<year>2017</year>
<volume>65</volume>
<journal>IEEE Trans. Commun.</journal>
<number>6</number>
<ee>https://doi.org/10.1109/TCOMM.2017.2682238</ee>
<url>db/journals/tcom/tcom65.html#SheikholeslamiG17</url>
</article>
</r>
<r><article key="journals/twc/SobersBGTG17" mdate="2025-03-03">
<author orcid="0000-0002-8061-0786" pid="176/8109">Tamara V. Sobers</author>
<author orcid="0000-0002-1205-3906" pid="59/4744">Boulat A. Bash</author>
<author pid="42/5459-1">Saikat Guha 0001</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<author orcid="0000-0002-4190-9515" pid="77/910">Dennis Goeckel</author>
<title>Covert Communication in the Presence of an Uninformed Jammer.</title>
<pages>6193-6206</pages>
<year>2017</year>
<volume>16</volume>
<journal>IEEE Trans. Wirel. Commun.</journal>
<number>9</number>
<ee>https://doi.org/10.1109/TWC.2017.2720736</ee>
<url>db/journals/twc/twc16.html#SobersBGTG17</url>
</article>
</r>
<r><inproceedings key="conf/acssc/SoltaniGTH17" mdate="2023-06-26">
<author orcid="0000-0002-5157-5475" pid="178/5177">Ramin Soltani</author>
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<author pid="22/1797">Amir Houmansadr</author>
<title>Towards provably invisible network flow fingerprints.</title>
<pages>258-262</pages>
<year>2017</year>
<booktitle>ACSSC</booktitle>
<ee>https://doi.org/10.1109/ACSSC.2017.8335179</ee>
<ee>https://www.wikidata.org/entity/Q57534605</ee>
<crossref>conf/acssc/2017</crossref>
<url>db/conf/acssc/acssc2017.html#SoltaniGTH17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acssc/LiPG17" mdate="2025-08-27">
<author pid="75/6627-46">Ke Li 0046</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<author pid="77/910">Dennis L. Goeckel</author>
<title>Bayesian time series matching and privacy.</title>
<pages>1677-1681</pages>
<year>2017</year>
<booktitle>ACSSC</booktitle>
<ee>https://doi.org/10.1109/ACSSC.2017.8335645</ee>
<crossref>conf/acssc/2017</crossref>
<url>db/conf/acssc/acssc2017.html#LiPG17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acssc/GoeckelBSGT17" mdate="2024-08-04">
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-1205-3906" pid="59/4744">Boulat A. Bash</author>
<author pid="73/11343">Azadeh Sheikholeslami</author>
<author pid="42/5459-1">Saikat Guha 0001</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<title>Covert active sensing of linear systems.</title>
<pages>1692-1696</pages>
<year>2017</year>
<booktitle>ACSSC</booktitle>
<ee>https://doi.org/10.1109/ACSSC.2017.8335648</ee>
<crossref>conf/acssc/2017</crossref>
<url>db/conf/acssc/acssc2017.html#GoeckelBSGT17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acssc/SobersBGTG17" mdate="2023-06-26">
<author pid="176/8109">Tamara V. Sobers</author>
<author pid="59/4744">Boulat A. Bash</author>
<author pid="42/5459-1">Saikat Guha 0001</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Covert communications on continuous-time channels in the presence of jamming.</title>
<pages>1697-1701</pages>
<year>2017</year>
<booktitle>ACSSC</booktitle>
<ee>https://doi.org/10.1109/ACSSC.2017.8335649</ee>
<crossref>conf/acssc/2017</crossref>
<url>db/conf/acssc/acssc2017.html#SobersBGTG17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ciss/TakbiriHGP17" mdate="2017-05-17">
<author pid="199/8925">Nazanin Takbiri</author>
<author pid="22/1797">Amir Houmansadr</author>
<author pid="77/910">Dennis L. Goeckel</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<title>Fundamental limits of location privacy using anonymization.</title>
<pages>1-6</pages>
<year>2017</year>
<booktitle>CISS</booktitle>
<ee>https://doi.org/10.1109/CISS.2017.7926069</ee>
<crossref>conf/ciss/2017</crossref>
<url>db/conf/ciss/ciss2017.html#TakbiriHGP17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isit/TakbiriHGP17" mdate="2017-08-17">
<author pid="199/8925">Nazanin Takbiri</author>
<author pid="22/1797">Amir Houmansadr</author>
<author pid="77/910">Dennis L. Goeckel</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<title>Limits of location privacy under anonymization and obfuscation.</title>
<pages>764-768</pages>
<year>2017</year>
<booktitle>ISIT</booktitle>
<ee>https://doi.org/10.1109/ISIT.2017.8006631</ee>
<crossref>conf/isit/2017</crossref>
<url>db/conf/isit/isit2017.html#TakbiriHGP17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wons/ShifrinM0GG17" mdate="2018-11-02">
<author orcid="0000-0002-7671-2229" pid="10/6671">Mark Shifrin</author>
<author pid="44/4915">Daniel Sadoc Menasch&#233;</author>
<author pid="18/1993-1">Asaf Cohen 0001</author>
<author pid="16/6327">Omer Gurewitz</author>
<author pid="77/910">Dennis Goeckel</author>
<title>An SMDP approach to optimal PHY configuration in wireless networks.</title>
<pages>128-135</pages>
<year>2017</year>
<booktitle>WONS</booktitle>
<ee>https://doi.org/10.1109/WONS.2017.7888760</ee>
<crossref>conf/wons/2017</crossref>
<url>db/conf/wons/wons2017.html#ShifrinM0GG17</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/SheikholeslamiG17" mdate="2018-08-13">
<author pid="73/11343">Azadeh Sheikholeslami</author>
<author pid="78/4129">Majid Ghaderi</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Energy-Efficient Secrecy in Wireless Networks Based on Random Jamming.</title>
<year>2017</year>
<volume>abs/1703.05194</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1703.05194</ee>
<url>db/journals/corr/corr1703.html#SheikholeslamiG17</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1709-07096" mdate="2022-04-08">
<author pid="178/5177">Ramin Soltani</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="t/DonaldFTowsley">Don Towsley</author>
<author pid="59/4744">Boulat A. Bash</author>
<author pid="42/5459-1">Saikat Guha 0001</author>
<title>Covert Wireless Communication with Artificial Noise Generation.</title>
<year>2017</year>
<volume>abs/1709.07096</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1709.07096</ee>
<url>db/journals/corr/corr1709.html#abs-1709-07096</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1710-00197" mdate="2018-08-13">
<author pid="199/8925">Nazanin Takbiri</author>
<author pid="22/1797">Amir Houmansadr</author>
<author pid="77/910">Dennis L. Goeckel</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<title>Matching Anonymized and Obfuscated Time Series to Users' Profiles.</title>
<year>2017</year>
<volume>abs/1710.00197</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1710.00197</ee>
<url>db/journals/corr/corr1710.html#abs-1710-00197</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1711-10079" mdate="2018-08-13">
<author pid="178/5177">Ramin Soltani</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="t/DonaldFTowsley">Don Towsley</author>
<author pid="22/1797">Amir Houmansadr</author>
<title>Towards Provably Invisible Network Flow Fingerprints.</title>
<year>2017</year>
<volume>abs/1711.10079</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1711.10079</ee>
<url>db/journals/corr/corr1711.html#abs-1711-10079</url>
</article>
</r>
<r><article key="journals/icl/GoeckelBGT16" mdate="2024-08-04">
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-1205-3906" pid="59/4744">Boulat A. Bash</author>
<author pid="42/5459-1">Saikat Guha 0001</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<title>Covert Communications When the Warden Does Not Know the Background Noise Power.</title>
<pages>236-239</pages>
<year>2016</year>
<volume>20</volume>
<journal>IEEE Commun. Lett.</journal>
<number>2</number>
<ee>https://doi.org/10.1109/LCOMM.2015.2507594</ee>
<url>db/journals/icl/icl20.html#GoeckelBGT16</url>
</article>
</r>
<r><article key="journals/tvt/SeetharamKG16" mdate="2020-06-25">
<author pid="16/599">Anand Seetharam</author>
<author pid="k/JamesFKurose">Jim Kurose</author>
<author pid="77/910">Dennis Goeckel</author>
<title>A Markovian Model for Coarse-Timescale Channel Variation in Wireless Networks.</title>
<pages>1701-1710</pages>
<year>2016</year>
<volume>65</volume>
<journal>IEEE Trans. Veh. Technol.</journal>
<number>3</number>
<ee>https://doi.org/10.1109/TVT.2015.2414398</ee>
<url>db/journals/tvt/tvt65.html#SeetharamKG16</url>
</article>
</r>
<r><article key="journals/twc/SheikholeslamiG16" mdate="2020-09-06">
<author pid="73/11343">Azadeh Sheikholeslami</author>
<author pid="78/4129">Majid Ghaderi</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Energy-Efficient Routing in Wireless Networks in the Presence of Jamming.</title>
<pages>6828-6842</pages>
<year>2016</year>
<volume>15</volume>
<journal>IEEE Trans. Wirel. Commun.</journal>
<number>10</number>
<ee>https://doi.org/10.1109/TWC.2016.2591016</ee>
<url>db/journals/twc/twc15.html#SheikholeslamiG16</url>
</article>
</r>
<r><article key="journals/twc/BashGT16" mdate="2023-06-26">
<author orcid="0000-0002-1205-3906" pid="59/4744">Boulat A. Bash</author>
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<title>Covert Communication Gains From Adversary's Ignorance of Transmission Time.</title>
<pages>8394-8405</pages>
<year>2016</year>
<volume>15</volume>
<journal>IEEE Trans. Wirel. Commun.</journal>
<number>12</number>
<ee>https://doi.org/10.1109/TWC.2016.2614502</ee>
<ee>https://www.wikidata.org/entity/Q56750815</ee>
<url>db/journals/twc/twc15.html#BashGT16</url>
</article>
</r>
<r><inproceedings key="conf/allerton/SoltaniGTH16" mdate="2023-06-26">
<author orcid="0000-0002-5157-5475" pid="178/5177">Ramin Soltani</author>
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<author pid="22/1797">Amir Houmansadr</author>
<title>Covert communications on renewal packet channels.</title>
<pages>548-555</pages>
<year>2016</year>
<booktitle>Allerton</booktitle>
<ee>https://doi.org/10.1109/ALLERTON.2016.7852279</ee>
<crossref>conf/allerton/2016</crossref>
<url>db/conf/allerton/allerton2016.html#SoltaniGTH16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isit/SheikholeslamiB16" mdate="2024-08-04">
<author pid="73/11343">Azadeh Sheikholeslami</author>
<author orcid="0000-0002-1205-3906" pid="59/4744">Boulat A. Bash</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="42/5459-1">Saikat Guha 0001</author>
<title>Covert communication over classical-quantum channels.</title>
<pages>2064-2068</pages>
<year>2016</year>
<booktitle>ISIT</booktitle>
<ee>https://doi.org/10.1109/ISIT.2016.7541662</ee>
<crossref>conf/isit/2016</crossref>
<url>db/conf/isit/isit2016.html#SheikholeslamiB16</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/SheikholeslamiB16" mdate="2022-04-08">
<author pid="73/11343">Azadeh Sheikholeslami</author>
<author pid="59/4744">Boulat A. Bash</author>
<author pid="t/DonaldFTowsley">Donald F. Towsley</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="42/5459-1">Saikat Guha 0001</author>
<title>Covert Communication over Classical-Quantum Channels.</title>
<year>2016</year>
<volume>abs/1601.06826</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1601.06826</ee>
<url>db/journals/corr/corr1601.html#SheikholeslamiB16</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/SobersBGTG16" mdate="2022-04-08">
<author pid="176/8109">Tamara V. Sobers</author>
<author pid="59/4744">Boulat A. Bash</author>
<author pid="42/5459-1">Saikat Guha 0001</author>
<author pid="t/DonaldFTowsley">Don Towsley</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Covert Communication in the Presence of an Uninformed Jammer.</title>
<year>2016</year>
<volume>abs/1608.00698</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1608.00698</ee>
<url>db/journals/corr/corr1608.html#SobersBGTG16</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/SoltaniGTH16" mdate="2018-08-13">
<author pid="178/5177">Ramin Soltani</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="t/DonaldFTowsley">Don Towsley</author>
<author pid="22/1797">Amir Houmansadr</author>
<title>Covert Communications on Renewal Packet Channels.</title>
<year>2016</year>
<volume>abs/1610.00368</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1610.00368</ee>
<url>db/journals/corr/corr1610.html#SoltaniGTH16</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/SoltaniGTH16a" mdate="2018-08-13">
<author pid="178/5177">Ramin Soltani</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="t/DonaldFTowsley">Don Towsley</author>
<author pid="22/1797">Amir Houmansadr</author>
<title>Covert Communications on Poisson Packet Channels.</title>
<year>2016</year>
<volume>abs/1610.00381</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1610.00381</ee>
<url>db/journals/corr/corr1610.html#SoltaniGTH16a</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/SoltaniBGGT16" mdate="2022-04-08">
<author pid="178/5177">Ramin Soltani</author>
<author pid="59/4744">Boulat A. Bash</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="42/5459-1">Saikat Guha 0001</author>
<author pid="t/DonaldFTowsley">Don Towsley</author>
<title>Covert Single-hop Communication in a Wireless Network with Distributed Artificial Noise Generation.</title>
<year>2016</year>
<volume>abs/1610.00384</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1610.00384</ee>
<url>db/journals/corr/corr1610.html#SoltaniBGGT16</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/ShifrinM0GG16" mdate="2018-08-13">
<author pid="10/6671">Mark Shifrin</author>
<author pid="44/4915">Daniel S. Menasch&#233;</author>
<author pid="18/1993-1">Asaf Cohen 0001</author>
<author pid="16/6327">Omer Gurewitz</author>
<author pid="77/910">Dennis Goeckel</author>
<title>An SMDP Approach to Optimal PHY Configuration in Wireless Networks.</title>
<year>2016</year>
<volume>abs/1610.05598</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1610.05598</ee>
<url>db/journals/corr/corr1610.html#ShifrinM0GG16</url>
</article>
</r>
<r><article key="journals/cm/BashGTG15" mdate="2024-08-04">
<author orcid="0000-0002-1205-3906" pid="59/4744">Boulat A. Bash</author>
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<author pid="42/5459-1">Saikat Guha 0001</author>
<title>Hiding information in noise: fundamental limits of covert wireless communication.</title>
<pages>26-31</pages>
<year>2015</year>
<volume>53</volume>
<journal>IEEE Commun. Mag.</journal>
<number>12</number>
<ee>https://doi.org/10.1109/MCOM.2015.7355562</ee>
<url>db/journals/cm/cm53.html#BashGTG15</url>
</article>
</r>
<r><article key="journals/tifs/PolakG15" mdate="2020-08-06">
<author pid="19/10031">Adam C. Polak</author>
<author pid="77/910">Dennis L. Goeckel</author>
<title>Wireless Device Identification Based on RF Oscillator Imperfections.</title>
<pages>2492-2501</pages>
<year>2015</year>
<volume>10</volume>
<journal>IEEE Trans. Inf. Forensics Secur.</journal>
<number>12</number>
<ee>https://doi.org/10.1109/TIFS.2015.2464778</ee>
<url>db/journals/tifs/tifs10.html#PolakG15</url>
</article>
</r>
<r><article key="journals/tmc/GhaderiGOD15" mdate="2017-05-28">
<author pid="78/4129">Majid Ghaderi</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="65/1175">Ariel Orda</author>
<author pid="46/8356">Mostafa Dehghan</author>
<title>Minimum Energy Routing and Jamming to Thwart Wireless Network Eavesdroppers.</title>
<pages>1433-1448</pages>
<year>2015</year>
<volume>14</volume>
<journal>IEEE Trans. Mob. Comput.</journal>
<number>7</number>
<ee>https://doi.org/10.1109/TMC.2014.2354031</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TMC.2014.2354031</ee>
<url>db/journals/tmc/tmc14.html#GhaderiGOD15</url>
</article>
</r>
<r><article key="journals/tsp/PolakDG15" mdate="2020-03-10">
<author pid="19/10031">Adam C. Polak</author>
<author pid="157/8095">Marco F. Duarte</author>
<author pid="77/910">Dennis L. Goeckel</author>
<title>Performance Bounds for Grouped Incoherent Measurements in Compressive Sensing.</title>
<pages>2877-2887</pages>
<year>2015</year>
<volume>63</volume>
<journal>IEEE Trans. Signal Process.</journal>
<number>11</number>
<ee>https://doi.org/10.1109/TSP.2015.2412912</ee>
<url>db/journals/tsp/tsp63.html#PolakDG15</url>
</article>
</r>
<r><article key="journals/twc/PolakG15" mdate="2020-09-06">
<author pid="19/10031">Adam C. Polak</author>
<author pid="77/910">Dennis L. Goeckel</author>
<title>Identification of Wireless Devices of Users Who Actively Fake Their RF Fingerprints With Artificial Data Distortion.</title>
<pages>5889-5899</pages>
<year>2015</year>
<volume>14</volume>
<journal>IEEE Trans. Wirel. Commun.</journal>
<number>11</number>
<ee>https://doi.org/10.1109/TWC.2015.2443794</ee>
<url>db/journals/twc/twc14.html#PolakG15</url>
</article>
</r>
<r><article key="journals/twc/SheikholeslamiG15" mdate="2025-03-03">
<author pid="73/11343">Azadeh Sheikholeslami</author>
<author orcid="0000-0002-4190-9515" pid="77/910">Dennis Goeckel</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<title>Jamming Based on an Ephemeral Key to Obtain Everlasting Security in Wireless Environments.</title>
<pages>6072-6081</pages>
<year>2015</year>
<volume>14</volume>
<journal>IEEE Trans. Wirel. Commun.</journal>
<number>11</number>
<ee>https://doi.org/10.1109/TWC.2015.2448074</ee>
<url>db/journals/twc/twc14.html#SheikholeslamiG15</url>
</article>
</r>
<r><inproceedings key="conf/acssc/SobersBGGT15" mdate="2023-06-26">
<author orcid="0000-0002-8061-0786" pid="176/8109">Tamara V. Sobers</author>
<author pid="59/4744">Boulat A. Bash</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="42/5459-1">Saikat Guha 0001</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<title>Covert communication with the help of an uninformed jammer achieves positive rate.</title>
<pages>625-629</pages>
<year>2015</year>
<booktitle>ACSSC</booktitle>
<ee>https://doi.org/10.1109/ACSSC.2015.7421206</ee>
<crossref>conf/acssc/2015</crossref>
<url>db/conf/acssc/acssc2015.html#SobersBGGT15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/allerton/SoltaniGTH15" mdate="2023-06-26">
<author orcid="0000-0002-5157-5475" pid="178/5177">Ramin Soltani</author>
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<author pid="22/1797">Amir Houmansadr</author>
<title>Covert communications on Poisson packet channels.</title>
<pages>1046-1052</pages>
<year>2015</year>
<booktitle>Allerton</booktitle>
<ee>https://doi.org/10.1109/ALLERTON.2015.7447124</ee>
<crossref>conf/allerton/2015</crossref>
<url>db/conf/allerton/allerton2015.html#SoltaniGTH15</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/BashGGT15" mdate="2022-04-08">
<author pid="59/4744">Boulat A. Bash</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="42/5459-1">Saikat Guha 0001</author>
<author pid="t/DonaldFTowsley">Don Towsley</author>
<title>Hiding Information in Noise: Fundamental Limits of Covert Wireless Communication.</title>
<year>2015</year>
<volume>abs/1506.00066</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1506.00066</ee>
<url>db/journals/corr/corr1506.html#BashGGT15</url>
</article>
</r>
<r><inproceedings key="conf/acssc/SheikholeslamiG14" mdate="2017-05-21">
<author pid="73/11343">Azadeh Sheikholeslami</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<title>Everlasting secrecy in disadvantaged wireless environments against sophisticated eavesdroppers.</title>
<pages>1994-1998</pages>
<year>2014</year>
<booktitle>ACSSC</booktitle>
<ee>https://doi.org/10.1109/ACSSC.2014.7094820</ee>
<crossref>conf/acssc/2014</crossref>
<url>db/conf/acssc/acssc2014.html#SheikholeslamiG14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/allerton/SoltaniBGGT14" mdate="2024-08-04">
<author orcid="0000-0002-5157-5475" pid="178/5177">Ramin Soltani</author>
<author orcid="0000-0002-1205-3906" pid="59/4744">Boulat A. Bash</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="42/5459-1">Saikat Guha 0001</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<title>Covert single-hop communication in a wireless network with distributed artificial noise generation.</title>
<pages>1078-1085</pages>
<year>2014</year>
<booktitle>Allerton</booktitle>
<ee>https://doi.org/10.1109/ALLERTON.2014.7028575</ee>
<crossref>conf/allerton/2014</crossref>
<url>db/conf/allerton/allerton2014.html#SoltaniBGGT14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ciss/SheikholeslamiPGG14" mdate="2017-05-19">
<author pid="73/11343">Azadeh Sheikholeslami</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<author pid="78/4129">Majid Ghaderi</author>
<author pid="77/910">Dennis Goeckel</author>
<title>On the impact of dynamic jamming on end-to-end delay in linear wireless networks.</title>
<pages>1-6</pages>
<year>2014</year>
<booktitle>CISS</booktitle>
<ee>https://doi.org/10.1109/CISS.2014.6814094</ee>
<crossref>conf/ciss/2014</crossref>
<url>db/conf/ciss/ciss2014.html#SheikholeslamiPGG14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icassp/PolakG14" mdate="2017-05-19">
<author pid="19/10031">Adam C. Polak</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Wireless device identification based on RF oscillator imperfections.</title>
<pages>2679-2683</pages>
<year>2014</year>
<booktitle>ICASSP</booktitle>
<ee>https://doi.org/10.1109/ICASSP.2014.6854086</ee>
<crossref>conf/icassp/2014</crossref>
<url>db/conf/icassp/icassp2014.html#PolakG14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icc/SheikholeslamiGPG14" mdate="2017-05-25">
<author pid="73/11343">Azadeh Sheikholeslami</author>
<author pid="78/4129">Majid Ghaderi</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Jamming-aware minimum energy routing in wireless networks.</title>
<pages>2313-2318</pages>
<year>2014</year>
<booktitle>ICC</booktitle>
<ee>https://doi.org/10.1109/ICC.2014.6883668</ee>
<crossref>conf/icc/2014</crossref>
<url>db/conf/icc/icc2014.html#SheikholeslamiGPG14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isit/BashGT14" mdate="2023-06-26">
<author pid="59/4744">Boulat A. Bash</author>
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<title>LPD communication when the warden does not know when.</title>
<pages>606-610</pages>
<year>2014</year>
<booktitle>ISIT</booktitle>
<ee>https://doi.org/10.1109/ISIT.2014.6874904</ee>
<crossref>conf/isit/2014</crossref>
<url>db/conf/isit/isit2014.html#BashGT14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/milcom/MorrisonG14" mdate="2022-09-16">
<author pid="117/5586">Kyle Morrison</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Secrecy Rate Pair Constraints for Secure Throughput.</title>
<pages>479-484</pages>
<year>2014</year>
<booktitle>MILCOM</booktitle>
<ee>https://doi.org/10.1109/MILCOM.2014.87</ee>
<crossref>conf/milcom/2014</crossref>
<url>db/conf/milcom/milcom2014.html#MorrisonG14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/valuetools/FofackDTBG14" mdate="2023-06-26">
<author pid="120/0237">Nicaise Choungmo Fofack</author>
<author pid="46/8356">Mostafa Dehghan</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<author pid="160/5912">Misha Badov</author>
<author pid="77/910">Dennis L. Goeckel</author>
<title>On the Performance of General Cache Networks.</title>
<year>2014</year>
<booktitle>VALUETOOLS</booktitle>
<ee>https://doi.org/10.4108/icst.valuetools.2014.258168</ee>
<crossref>conf/valuetools/2014</crossref>
<url>db/conf/valuetools/valuetools2014.html#FofackDTBG14</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/BashGT14" mdate="2018-08-13">
<author pid="59/4744">Boulat A. Bash</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="t/DonaldFTowsley">Don Towsley</author>
<title>LPD Communication when the Warden Does Not Know When.</title>
<year>2014</year>
<volume>abs/1403.1013</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1403.1013</ee>
<url>db/journals/corr/corr1403.html#BashGT14</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/BashGGT14" mdate="2022-04-08">
<author pid="59/4744">Boulat A. Bash</author>
<author pid="42/5459-1">Saikat Guha 0001</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="t/DonaldFTowsley">Don Towsley</author>
<title>Quantum-noise limited communication with low probability of detection.</title>
<year>2014</year>
<volume>abs/1403.5616</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1403.5616</ee>
<url>db/journals/corr/corr1403.html#BashGGT14</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/BashGPHGTG14" mdate="2022-04-08">
<author pid="59/4744">Boulat A. Bash</author>
<author pid="144/7541">Andrei H. Gheorghe</author>
<author pid="144/7760">Monika Patel</author>
<author pid="74/10945">Jonathan L. Habif</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="t/DonaldFTowsley">Don Towsley</author>
<author pid="42/5459-1">Saikat Guha 0001</author>
<title>Covert Optical Communication.</title>
<year>2014</year>
<volume>abs/1404.7347</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1404.7347</ee>
<url>db/journals/corr/corr1404.html#BashGPHGTG14</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/SheikholeslamiGPG14" mdate="2018-08-13">
<author pid="73/11343">Azadeh Sheikholeslami</author>
<author pid="78/4129">Majid Ghaderi</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Minimum Energy Routing in Wireless Networks in the Presence of Jamming.</title>
<year>2014</year>
<volume>abs/1411.3736</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1411.3736</ee>
<url>db/journals/corr/corr1411.html#SheikholeslamiGPG14</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/SheikholeslamiGP14" mdate="2018-08-13">
<author pid="73/11343">Azadeh Sheikholeslami</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<title>Jamming Based on an Ephemeral Key to Obtain Everlasting Security in Wireless Environments.</title>
<year>2014</year>
<volume>abs/1412.6014</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1412.6014</ee>
<url>db/journals/corr/corr1412.html#SheikholeslamiGP14</url>
</article>
</r>
<r><article key="journals/iandc/CaparGPQTZ13" mdate="2023-06-26">
<author pid="37/9508">Cagatay Capar</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="39/780">Kenneth G. Paterson</author>
<author orcid="0000-0002-4010-773X" pid="52/8437">Elizabeth A. Quaglia</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<author pid="36/4655">Murtaza Zafer</author>
<title>Signal-flow-based analysis of wireless security protocols.</title>
<pages>37-56</pages>
<year>2013</year>
<volume>226</volume>
<journal>Inf. Comput.</journal>
<ee type="oa">https://doi.org/10.1016/j.ic.2013.03.004</ee>
<url>db/journals/iandc/iandc226.html#CaparGPQTZ13</url>
</article>
</r>
<r><article key="journals/jsac/WeiHBGJKT13" mdate="2023-06-26">
<author pid="24/4105-1">Wei Wei 0001</author>
<author pid="52/854-1">Ting He 0001</author>
<author pid="18/1840">Chatschik Bisdikian</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="34/2005-3">Bo Jiang 0003</author>
<author pid="47/4107">Lance M. Kaplan</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<title>Impact of In-Network Aggregation on Target Tracking Quality Under Network Delays.</title>
<pages>808-818</pages>
<year>2013</year>
<volume>31</volume>
<journal>IEEE J. Sel. Areas Commun.</journal>
<number>4</number>
<ee>https://doi.org/10.1109/JSAC.2013.130416</ee>
<url>db/journals/jsac/jsac31.html#WeiHBGJKT13</url>
</article>
</r>
<r><article key="journals/jsac/SheikholeslamiGP13" mdate="2020-04-02">
<author pid="73/11343">Azadeh Sheikholeslami</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<title>Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper's Receiver.</title>
<pages>1828-1839</pages>
<year>2013</year>
<volume>31</volume>
<journal>IEEE J. Sel. Areas Commun.</journal>
<number>9</number>
<ee>https://doi.org/10.1109/JSAC.2013.130915</ee>
<url>db/journals/jsac/jsac31.html#SheikholeslamiGP13</url>
</article>
</r>
<r><article key="journals/jsac/BashGT13" mdate="2025-03-03">
<author orcid="0000-0002-1205-3906" pid="59/4744">Boulat A. Bash</author>
<author orcid="0000-0002-4190-9515" pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<title>Limits of Reliable Communication with Low Probability of Detection on AWGN Channels.</title>
<pages>1921-1930</pages>
<year>2013</year>
<volume>31</volume>
<journal>IEEE J. Sel. Areas Commun.</journal>
<number>9</number>
<ee>https://doi.org/10.1109/JSAC.2013.130923</ee>
<url>db/journals/jsac/jsac31.html#BashGT13</url>
</article>
</r>
<r><article key="journals/tit/CaparGT13" mdate="2023-06-26">
<author pid="37/9508">Cagatay Capar</author>
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<title>Broadcast Analysis for Extended Cooperative Wireless Networks.</title>
<pages>5805-5810</pages>
<year>2013</year>
<volume>59</volume>
<journal>IEEE Trans. Inf. Theory</journal>
<number>9</number>
<ee>https://doi.org/10.1109/TIT.2013.2252418</ee>
<url>db/journals/tit/tit59.html#CaparGT13</url>
</article>
</r>
<r><article key="journals/ton/VasudevanAGT13" mdate="2023-06-26">
<author pid="05/4289">Sudarshan Vasudevan</author>
<author pid="a/MicahAdler">Micah Adler</author>
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<title>Efficient Algorithms for Neighbor Discovery in Wireless Networks.</title>
<pages>69-83</pages>
<year>2013</year>
<volume>21</volume>
<journal>IEEE/ACM Trans. Netw.</journal>
<number>1</number>
<ee>https://doi.org/10.1109/TNET.2012.2189892</ee>
<url>db/journals/ton/ton21.html#VasudevanAGT13</url>
</article>
</r>
<r><article key="journals/wcl/BashGT13" mdate="2024-08-04">
<author orcid="0000-0002-1205-3906" pid="59/4744">Boulat A. Bash</author>
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<title>Asymptotic Optimality of Equal Power Allocation for Linear Estimation of WSS Random Processes.</title>
<pages>247-250</pages>
<year>2013</year>
<volume>2</volume>
<journal>IEEE Wirel. Commun. Lett.</journal>
<number>3</number>
<ee>https://doi.org/10.1109/WCL.2013.020513.120908</ee>
<url>db/journals/wcl/wcl2.html#BashGT13</url>
</article>
</r>
<r><inproceedings key="conf/icassp/PolakDJG13" mdate="2017-05-19">
<author pid="19/10031">Adam C. Polak</author>
<author pid="157/8095">Marco F. Duarte</author>
<author pid="90/10179">Robert W. Jackson</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Recovery of sparse signals from amplitude-limited sample sets.</title>
<pages>4663-4667</pages>
<year>2013</year>
<booktitle>ICASSP</booktitle>
<ee>https://doi.org/10.1109/ICASSP.2013.6638544</ee>
<crossref>conf/icassp/2013</crossref>
<url>db/conf/icassp/icassp2013.html#PolakDJG13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/infocom/HeGRT13" mdate="2023-06-26">
<author pid="52/854-1">Ting He 0001</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="88/5233">Ramya Raghavendra</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<title>Endhost-based shortest path routing in dynamic networks: An online learning approach.</title>
<pages>2202-2210</pages>
<year>2013</year>
<booktitle>INFOCOM</booktitle>
<ee>https://doi.org/10.1109/INFCOM.2013.6567023</ee>
<crossref>conf/infocom/2013</crossref>
<url>db/conf/infocom/infocom2013.html#HeGRT13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isit/BashGGT13" mdate="2023-06-26">
<author pid="59/4744">Boulat A. Bash</author>
<author pid="42/5459-1">Saikat Guha 0001</author>
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<title>Quantum noise limited optical communication with low probability of detection.</title>
<pages>1715-1719</pages>
<year>2013</year>
<booktitle>ISIT</booktitle>
<ee>https://doi.org/10.1109/ISIT.2013.6620520</ee>
<crossref>conf/isit/2013</crossref>
<url>db/conf/isit/isit2013.html#BashGGT13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isit/SheikholeslamiGP13" mdate="2017-05-24">
<author pid="73/11343">Azadeh Sheikholeslami</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<title>Artificial intersymbol interference (ISI) to exploit receiver imperfections for secrecy.</title>
<pages>2950-2954</pages>
<year>2013</year>
<booktitle>ISIT</booktitle>
<ee>https://doi.org/10.1109/ISIT.2013.6620766</ee>
<crossref>conf/isit/2013</crossref>
<url>db/conf/isit/isit2013.html#SheikholeslamiGP13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/milcom/SeetharamJGKH13" mdate="2018-06-10">
<author pid="16/599">Anand Seetharam</author>
<author pid="34/2005-3">Bo Jiang 0003</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="k/JamesFKurose">Jim Kurose</author>
<author pid="52/9826">Robert E. Hancock</author>
<title>Optimizing Control Overhead for Power-Aware Routing in Wireless Networks.</title>
<pages>870-875</pages>
<year>2013</year>
<booktitle>MILCOM</booktitle>
<ee>https://doi.org/10.1109/MILCOM.2013.152</ee>
<crossref>conf/milcom/2013</crossref>
<url>db/conf/milcom/milcom2013.html#SeetharamJGKH13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/milcom/DehghanGHT13" mdate="2023-06-26">
<author pid="46/8356">Mostafa Dehghan</author>
<author pid="77/910">Dennis L. Goeckel</author>
<author pid="52/854-1">Ting He 0001</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<title>Inferring Military Activity in Hybrid Networks through Cache Behavior.</title>
<pages>1726-1731</pages>
<year>2013</year>
<booktitle>MILCOM</booktitle>
<ee>https://doi.org/10.1109/MILCOM.2013.292</ee>
<crossref>conf/milcom/2013</crossref>
<url>db/conf/milcom/milcom2013.html#DehghanGHT13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/secon/GhaderiGOD13" mdate="2017-05-24">
<author pid="78/4129">Majid Ghaderi</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="65/1175">Ariel Orda</author>
<author pid="46/8356">Mostafa Dehghan</author>
<title>Efficient wireless security through jamming, coding and routing.</title>
<pages>505-513</pages>
<year>2013</year>
<booktitle>SECON</booktitle>
<ee>https://doi.org/10.1109/SAHCN.2013.6645022</ee>
<crossref>conf/secon/2013</crossref>
<url>db/conf/secon/secon2013.html#GhaderiGOD13</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-1304-2688" mdate="2018-08-13">
<author pid="78/4129">Majid Ghaderi</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="65/1175">Ariel Orda</author>
<author pid="46/8356">Mostafa Dehghan</author>
<title>Efficient Wireless Security Through Jamming, Coding and Routing</title>
<ee type="oa">http://arxiv.org/abs/1304.2688</ee>
<year>2013</year>
<journal>CoRR</journal>
<volume>abs/1304.2688</volume>
<url>db/journals/corr/corr1304.html#abs-1304-2688</url>
</article>
</r>
<r><article key="journals/jsac/DingLGT12" mdate="2023-06-26">
<author pid="64/361-1">Zhiguo Ding 0001</author>
<author pid="04/2707">Kin K. Leung</author>
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<title>On the Application of Cooperative Transmission to Secrecy Communications.</title>
<pages>359-368</pages>
<year>2012</year>
<volume>30</volume>
<journal>IEEE J. Sel. Areas Commun.</journal>
<number>2</number>
<ee>https://doi.org/10.1109/JSAC.2012.120215</ee>
<url>db/journals/jsac/jsac30.html#DingLGT12</url>
</article>
</r>
<r><article key="journals/tcom/MorrisonCG12" mdate="2020-09-01">
<author pid="117/5586">Kyle Morrison</author>
<author pid="37/9508">Cagatay Capar</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Peak Minimization for Reference-Based Ultra-Wideband (UWB) Radio.</title>
<pages>2054-2058</pages>
<year>2012</year>
<volume>60</volume>
<journal>IEEE Trans. Commun.</journal>
<number>8</number>
<ee>https://doi.org/10.1109/TCOMM.2012.060112.110128</ee>
<url>db/journals/tcom/tcom60.html#MorrisonCG12</url>
</article>
</r>
<r><article key="journals/twc/DehghanGGD12" mdate="2022-04-12">
<author pid="46/8356">Mostafa Dehghan</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="78/4129">Majid Ghaderi</author>
<author pid="64/361-1">Zhiguo Ding 0001</author>
<title>Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks.</title>
<pages>3025-3029</pages>
<year>2012</year>
<volume>11</volume>
<journal>IEEE Trans. Wirel. Commun.</journal>
<number>9</number>
<ee>https://doi.org/10.1109/TWC.2012.070912.110789</ee>
<url>db/journals/twc/twc11.html#DehghanGGD12</url>
</article>
</r>
<r><inproceedings key="conf/allerton/SheikholeslamiGP12" mdate="2017-05-21">
<author pid="73/11343">Azadeh Sheikholeslami</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<title>Exploiting the non-commutativity of nonlinear operators for information-theoretic security in disadvantaged wireless environments.</title>
<pages>233-240</pages>
<year>2012</year>
<booktitle>Allerton Conference</booktitle>
<ee>https://doi.org/10.1109/Allerton.2012.6483223</ee>
<crossref>conf/allerton/2012</crossref>
<url>db/conf/allerton/allerton2012.html#SheikholeslamiGP12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ciss/CaparG12" mdate="2017-05-19">
<author pid="37/9508">Cagatay Capar</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Network coding for facilitating secrecy in large wireless networks.</title>
<pages>1-6</pages>
<year>2012</year>
<booktitle>CISS</booktitle>
<ee>https://doi.org/10.1109/CISS.2012.6310906</ee>
<crossref>conf/ciss/2012</crossref>
<url>db/conf/ciss/ciss2012.html#CaparG12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/infocom/CaparGLT12" mdate="2023-06-26">
<author pid="37/9508">Cagatay Capar</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="01/6541">Benyuan Liu</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<title>Secret communication in large wireless networks without eavesdropper location information.</title>
<pages>1152-1160</pages>
<year>2012</year>
<booktitle>INFOCOM</booktitle>
<ee>https://doi.org/10.1109/INFCOM.2012.6195474</ee>
<crossref>conf/infocom/2012</crossref>
<url>db/conf/infocom/infocom2012.html#CaparGLT12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/infocom/SheikholeslamiGPT12" mdate="2023-06-26">
<author pid="73/11343">Azadeh Sheikholeslami</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<title>Physical layer security from inter-session interference in large wireless networks.</title>
<pages>1179-1187</pages>
<year>2012</year>
<booktitle>INFOCOM</booktitle>
<ee>https://doi.org/10.1109/INFCOM.2012.6195477</ee>
<crossref>conf/infocom/2012</crossref>
<url>db/conf/infocom/infocom2012.html#SheikholeslamiGPT12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/infocom/SeetharamKGB12" mdate="2017-05-16">
<author pid="16/599">Anand Seetharam</author>
<author pid="k/JamesFKurose">Jim Kurose</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="17/4296">Gautam D. Bhanage</author>
<title>A Markov chain model for coarse timescale channel variation in an 802.16e wireless network.</title>
<pages>1800-1807</pages>
<year>2012</year>
<booktitle>INFOCOM</booktitle>
<ee>https://doi.org/10.1109/INFCOM.2012.6195553</ee>
<crossref>conf/infocom/2012</crossref>
<url>db/conf/infocom/infocom2012.html#SeetharamKGB12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isit/BashGT12" mdate="2023-06-26">
<author pid="59/4744">Boulat A. Bash</author>
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<title>Square root law for communication with low probability of detection on AWGN channels.</title>
<pages>448-452</pages>
<year>2012</year>
<booktitle>ISIT</booktitle>
<ee>https://doi.org/10.1109/ISIT.2012.6284228</ee>
<crossref>conf/isit/2012</crossref>
<url>db/conf/isit/isit2012.html#BashGT12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ssp/PolakDG12" mdate="2017-05-25">
<author pid="19/10031">Adam C. Polak</author>
<author pid="157/8095">Marco F. Duarte</author>
<author pid="77/910">Dennis L. Goeckel</author>
<title>Grouped incoherent measurements for compressive sensing.</title>
<pages>732-735</pages>
<year>2012</year>
<booktitle>SSP</booktitle>
<ee>https://doi.org/10.1109/SSP.2012.6319807</ee>
<crossref>conf/ssp/2012</crossref>
<url>db/conf/ssp/ssp2012.html#PolakDG12</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-1202-6423" mdate="2018-08-13">
<author pid="59/4744">Boulat A. Bash</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="t/DonaldFTowsley">Don Towsley</author>
<title>Square Root Law for Communication with Low Probability of Detection on AWGN Channels</title>
<ee type="oa">http://arxiv.org/abs/1202.6423</ee>
<year>2012</year>
<journal>CoRR</journal>
<volume>abs/1202.6423</volume>
<url>db/journals/corr/corr1202.html#abs-1202-6423</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1205-2118" mdate="2018-08-13">
<author pid="19/10031">Adam C. Polak</author>
<author pid="157/8095">Marco F. Duarte</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Performance Bounds for Grouped Incoherent Measurements in Compressive Sensing</title>
<ee type="oa">http://arxiv.org/abs/1205.2118</ee>
<year>2012</year>
<journal>CoRR</journal>
<volume>abs/1205.2118</volume>
<url>db/journals/corr/corr1205.html#abs-1205-2118</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1210-1790" mdate="2018-08-13">
<author pid="73/11343">Azadeh Sheikholeslami</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="72/4747">Hossein Pishro-Nik</author>
<title>Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper's Receiver</title>
<ee type="oa">http://arxiv.org/abs/1210.1790</ee>
<year>2012</year>
<journal>CoRR</journal>
<volume>abs/1210.1790</volume>
<url>db/journals/corr/corr1210.html#abs-1210-1790</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1212-2316" mdate="2018-08-13">
<author pid="59/4744">Boulat A. Bash</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="t/DonaldFTowsley">Don Towsley</author>
<title>Asymptotic Optimality of Equal Power Allocation for Linear Estimation of WSS Random Processes</title>
<ee type="oa">http://arxiv.org/abs/1212.2316</ee>
<year>2012</year>
<journal>CoRR</journal>
<volume>abs/1212.2316</volume>
<url>db/journals/corr/corr1212.html#abs-1212-2316</url>
</article>
</r>
<r><article key="journals/jsac/PolakDG11" mdate="2025-03-03">
<author pid="19/10031">Adam C. Polak</author>
<author orcid="0000-0003-0226-0933" pid="29/10031">Sepideh Dolatshahi</author>
<author orcid="0000-0002-4190-9515" pid="77/910">Dennis Goeckel</author>
<title>Identifying Wireless Users via Transmitter Imperfections.</title>
<pages>1469-1479</pages>
<year>2011</year>
<volume>29</volume>
<journal>IEEE J. Sel. Areas Commun.</journal>
<number>7</number>
<ee>https://doi.org/10.1109/JSAC.2011.110812</ee>
<url>db/journals/jsac/jsac29.html#PolakDG11</url>
</article>
</r>
<r><article key="journals/jsac/GoeckelVTADL11" mdate="2023-06-26">
<author pid="77/910">Dennis Goeckel</author>
<author pid="05/4289">Sudarshan Vasudevan</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<author pid="95/10496">Stephan Adams</author>
<author pid="64/361-1">Zhiguo Ding 0001</author>
<author pid="04/2707">Kin K. Leung</author>
<title>Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks.</title>
<pages>2067-2076</pages>
<year>2011</year>
<volume>29</volume>
<journal>IEEE J. Sel. Areas Commun.</journal>
<number>10</number>
<ee>https://doi.org/10.1109/JSAC.2011.111216</ee>
<url>db/journals/jsac/jsac29.html#GoeckelVTADL11</url>
</article>
</r>
<r><article key="journals/twc/LeowDLG11" mdate="2020-09-06">
<author orcid="0000-0001-6418-0184" pid="19/9372">Chee Yen Leow</author>
<author pid="64/361-1">Zhiguo Ding 0001</author>
<author pid="04/2707">Kin K. Leung</author>
<author pid="77/910">Dennis Goeckel</author>
<title>On the Study of Analogue Network Coding for Multi-Pair, Bidirectional Relay Channels.</title>
<pages>670-681</pages>
<year>2011</year>
<volume>10</volume>
<journal>IEEE Trans. Wirel. Commun.</journal>
<number>2</number>
<ee>https://doi.org/10.1109/TWC.2010.120610.101017</ee>
<url>db/journals/twc/twc10.html#LeowDLG11</url>
</article>
</r>
<r><article key="journals/twc/DingLGT11" mdate="2023-06-26">
<author pid="64/361-1">Zhiguo Ding 0001</author>
<author pid="04/2707">Kin K. Leung</author>
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<title>Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting.</title>
<pages>1725-1729</pages>
<year>2011</year>
<volume>10</volume>
<journal>IEEE Trans. Wirel. Commun.</journal>
<number>6</number>
<ee>https://doi.org/10.1109/TWC.2011.040511.101694</ee>
<url>db/journals/twc/twc10.html#DingLGT11</url>
</article>
</r>
<r><article key="journals/twc/DehghanGG11" mdate="2020-09-06">
<author pid="46/8356">Mostafa Dehghan</author>
<author pid="78/4129">Majid Ghaderi</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Minimum-Energy Cooperative Routing in Wireless Networks with Channel Variations.</title>
<pages>3813-3823</pages>
<year>2011</year>
<volume>10</volume>
<journal>IEEE Trans. Wirel. Commun.</journal>
<number>11</number>
<ee>https://doi.org/10.1109/TWC.2011.080611.102189</ee>
<url>db/journals/twc/twc10.html#DehghanGG11</url>
</article>
</r>
<r><inproceedings key="conf/acssc/PolakG11" mdate="2017-05-21">
<author pid="19/10031">Adam C. Polak</author>
<author pid="77/910">Dennis Goeckel</author>
<title>RF fingerprinting of users who actively mask their identities with artificial distortion.</title>
<pages>270-274</pages>
<year>2011</year>
<booktitle>ACSCC</booktitle>
<ee>https://doi.org/10.1109/ACSSC.2011.6190000</ee>
<crossref>conf/acssc/2011</crossref>
<url>db/conf/acssc/acssc2011.html#PolakG11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acssc/MorrisonG11" mdate="2017-05-21">
<author pid="117/5586">Kyle Morrison</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Power allocation to noise-generating nodes for cooperative secrecy in the wireless environment.</title>
<pages>275-279</pages>
<year>2011</year>
<booktitle>ACSCC</booktitle>
<ee>https://doi.org/10.1109/ACSSC.2011.6190001</ee>
<crossref>conf/acssc/2011</crossref>
<url>db/conf/acssc/acssc2011.html#MorrisonG11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acssc/LeowCGL11" mdate="2017-05-29">
<author orcid="0000-0001-6418-0184" pid="19/9372">Chee Yen Leow</author>
<author pid="37/9508">Cagatay Capar</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="04/2707">Kin K. Leung</author>
<title>Two-way secrecy schemes for the broadcast channel with internal eavesdroppers.</title>
<pages>1840-1844</pages>
<year>2011</year>
<booktitle>ACSCC</booktitle>
<ee>https://doi.org/10.1109/ACSSC.2011.6190341</ee>
<crossref>conf/acssc/2011</crossref>
<url>db/conf/acssc/acssc2011.html#LeowCGL11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ciss/CaparGLT11" mdate="2023-06-26">
<author pid="37/9508">Cagatay Capar</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="01/6541">Benyuan Liu</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Donald F. Towsley</author>
<title>Cooperative jamming to improve the connectivity of the 1-D secrecy graph.</title>
<pages>1-6</pages>
<year>2011</year>
<booktitle>CISS</booktitle>
<ee>https://doi.org/10.1109/CISS.2011.5766138</ee>
<crossref>conf/ciss/2011</crossref>
<url>db/conf/ciss/ciss2011.html#CaparGLT11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/conext/TieSVGG11" mdate="2026-02-19">
<author pid="62/7890">Xiaozheng Tie</author>
<author pid="16/599">Anand Seetharam</author>
<author pid="v/ArunVenkataramani">Arun Venkataramani</author>
<author pid="g/DeepakGanesan">Deepak Ganesan</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Anticipatory wireless bitrate control for blocks.</title>
<pages>9</pages>
<year>2011</year>
<booktitle>CoNEXT</booktitle>
<ee type="oa">https://doi.org/10.1145/2079296.2079305</ee>
<crossref>conf/conext/2011</crossref>
<url>db/conf/conext/conext2011.html#TieSVGG11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/infocom/BashGT11" mdate="2023-06-26">
<author pid="59/4744">Boulat A. Bash</author>
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Donald F. Towsley</author>
<title>Clustering in cooperative networks.</title>
<pages>486-490</pages>
<year>2011</year>
<booktitle>INFOCOM</booktitle>
<ee>https://doi.org/10.1109/INFCOM.2011.5935210</ee>
<crossref>conf/infocom/2011</crossref>
<url>db/conf/infocom/infocom2011.html#BashGT11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mobicom/SeetharamKGB11" mdate="2018-11-06">
<author pid="16/599">Anand Seetharam</author>
<author pid="k/JamesFKurose">Jim Kurose</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="17/4296">Gautam D. Bhanage</author>
<title>A markov chain model for coarse timescale channel variation in an 802.16e wireless network.</title>
<pages>9-12</pages>
<year>2011</year>
<booktitle>S3@MobiCom</booktitle>
<ee>https://doi.org/10.1145/2030686.2030690</ee>
<crossref>conf/mobicom/2011s3</crossref>
<url>db/conf/mobicom/s3-2011.html#SeetharamKGB11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mobicom/TieSVGG11" mdate="2018-11-06">
<author pid="62/7890">Xiaozheng Tie</author>
<author pid="16/599">Anand Seetharam</author>
<author pid="v/ArunVenkataramani">Arun Venkataramani</author>
<author pid="g/DeepakGanesan">Deepak Ganesan</author>
<author pid="77/910">Dennis L. Goeckel</author>
<title>Anticipatory wireless bitrate control for blocks.</title>
<pages>25-28</pages>
<year>2011</year>
<booktitle>S3@MobiCom</booktitle>
<ee>https://doi.org/10.1145/2030686.2030695</ee>
<crossref>conf/mobicom/2011s3</crossref>
<url>db/conf/mobicom/s3-2011.html#TieSVGG11</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-1104-3209" mdate="2018-08-13">
<author pid="37/9508">Cagatay Capar</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="t/DonaldFTowsley">Donald F. Towsley</author>
<title>Broadcast Analysis for Large Cooperative Wireless Networks</title>
<ee type="oa">http://arxiv.org/abs/1104.3209</ee>
<year>2011</year>
<journal>CoRR</journal>
<volume>abs/1104.3209</volume>
<url>db/journals/corr/corr1104.html#abs-1104-3209</url>
</article>
</r>
<r><article key="journals/tcom/DingLGT10" mdate="2023-06-26">
<author pid="64/361-1">Zhiguo Ding 0001</author>
<author pid="04/2707">Kin K. Leung</author>
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Donald F. Towsley</author>
<title>A Relay Assisted Cooperative Transmission Protocol for Wireless Multiple Access Systems.</title>
<pages>2425-2435</pages>
<year>2010</year>
<volume>58</volume>
<journal>IEEE Trans. Commun.</journal>
<number>8</number>
<ee>https://doi.org/10.1109/TCOMM.2010.062310.080466</ee>
<url>db/journals/tcom/tcom58.html#DingLGT10</url>
</article>
</r>
<r><article key="journals/tit/WeiGK10" mdate="2020-03-10">
<author pid="04/1738">Shuangqing Wei</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="52/1666">Patrick A. Kelly</author>
<title>Convergence of the complex envelope of bandlimited OFDM signals.</title>
<pages>4893-4904</pages>
<year>2010</year>
<volume>56</volume>
<journal>IEEE Trans. Inf. Theory</journal>
<number>10</number>
<ee>https://doi.org/10.1109/TIT.2010.2059550</ee>
<url>db/journals/tit/tit56.html#WeiGK10</url>
</article>
</r>
<r><article key="journals/twc/DingLGT10" mdate="2023-06-26">
<author pid="64/361-1">Zhiguo Ding 0001</author>
<author pid="04/2707">Kin K. Leung</author>
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Donald F. Towsley</author>
<title>Cooperative Transmission Protocols for Wireless Broadcast Channels.</title>
<pages>3701-3713</pages>
<year>2010</year>
<volume>9</volume>
<journal>IEEE Trans. Wirel. Commun.</journal>
<number>12</number>
<ee>https://doi.org/10.1109/TWC.2010.101810.091549</ee>
<url>db/journals/twc/twc9.html#DingLGT10</url>
</article>
</r>
<r><inproceedings key="conf/icc/DingLGT10" mdate="2023-06-26">
<author pid="64/361-1">Zhiguo Ding 0001</author>
<author pid="04/2707">Kin K. Leung</author>
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Donald F. Towsley</author>
<title>On the Application of Cooperative Transmission to Wireless Broadcast Channels.</title>
<pages>1-5</pages>
<year>2010</year>
<booktitle>ICC</booktitle>
<ee>https://doi.org/10.1109/ICC.2010.5502774</ee>
<crossref>conf/icc/2010</crossref>
<url>db/conf/icc/icc2010.html#DingLGT10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/infocom/KhaliliGTS10" mdate="2023-06-26">
<author pid="90/4201">Ramin Khalili</author>
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Donald F. Towsley</author>
<author pid="89/5072">Ananthram Swami</author>
<title>Neighbor Discovery with Reception Status Feedback to Transmitters.</title>
<pages>2375-2383</pages>
<year>2010</year>
<booktitle>INFOCOM</booktitle>
<ee>https://doi.org/10.1109/INFCOM.2010.5462064</ee>
<crossref>conf/infocom/2010</crossref>
<url>db/conf/infocom/infocom2010.html#KhaliliGTS10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ita/VasudevanAGDTL10" mdate="2023-06-26">
<author pid="05/4289">Sudarshan Vasudevan</author>
<author pid="95/10496">Stephan Adams</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="64/361-1">Zhiguo Ding 0001</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Donald F. Towsley</author>
<author pid="04/2707">Kin K. Leung</author>
<title>Multi-user diversity for secrecy in wireless networks.</title>
<pages>482-490</pages>
<year>2010</year>
<booktitle>ITA</booktitle>
<ee>https://doi.org/10.1109/ITA.2010.5454080</ee>
<crossref>conf/ita/2010</crossref>
<url>db/conf/ita/ita2010.html#VasudevanAGDTL10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mobicom/MenascheGT10" mdate="2023-06-26">
<author pid="44/4915">Daniel S. Menasch&#233;</author>
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<title>Optimal forwarding strategies for the relay channel under average delay constraints.</title>
<pages>1-4</pages>
<year>2010</year>
<booktitle>S3@MobiCom</booktitle>
<ee>https://doi.org/10.1145/1860039.1860041</ee>
<crossref>conf/mobicom/2010s3</crossref>
<url>db/conf/mobicom/s3-2010.html#MenascheGT10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mobihoc/VasudevanGT10" mdate="2023-06-26">
<author pid="05/4289">Sudarshan Vasudevan</author>
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Donald F. Towsley</author>
<title>Security-capacity trade-off in large wireless networks using keyless secrecy.</title>
<pages>21-30</pages>
<year>2010</year>
<booktitle>MobiHoc</booktitle>
<ee>https://doi.org/10.1145/1860093.1860097</ee>
<crossref>conf/mobihoc/2010</crossref>
<url>db/conf/mobihoc/mobihoc2010.html#VasudevanGT10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/percom/WeiHBGT10" mdate="2023-06-26">
<author pid="24/4105-1">Wei Wei 0001</author>
<author pid="52/854-1">Ting He 0001</author>
<author pid="18/1840">Chatschik Bisdikian</author>
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Donald F. Towsley</author>
<title>Target tracking with packet delays and losses - QoI amid latencies and missing data.</title>
<pages>93-98</pages>
<year>2010</year>
<booktitle>PerCom Workshops</booktitle>
<ee>https://doi.org/10.1109/PERCOMW.2010.5470609</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/PERCOMW.2010.5470609</ee>
<crossref>conf/percom/2010w</crossref>
<url>db/conf/percom/percomw2010.html#WeiHBGT10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wiopt/DehghanGG10" mdate="2021-08-12">
<author pid="46/8356">Mostafa Dehghan</author>
<author pid="78/4129">Majid Ghaderi</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Cooperative diversity routing in wireless networks.</title>
<pages>31-39</pages>
<year>2010</year>
<booktitle>WiOpt</booktitle>
<ee>https://ieeexplore.ieee.org/document/5518793/</ee>
<crossref>conf/wiopt/2010</crossref>
<url>db/conf/wiopt/wiopt2010.html#DehghanGG10</url>
</inproceedings>
</r>
<r><article key="journals/jsac/LiuGT09" mdate="2023-06-26">
<author pid="83/277">Junning Liu</author>
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Donald F. Towsley</author>
<title>Bounds on the throughput gain of network coding in unicast and multicast wireless networks.</title>
<pages>582-592</pages>
<year>2009</year>
<volume>27</volume>
<journal>IEEE J. Sel. Areas Commun.</journal>
<number>5</number>
<ee>https://doi.org/10.1109/JSAC.2009.090602</ee>
<url>db/journals/jsac/jsac27.html#LiuGT09</url>
</article>
</r>
<r><article key="journals/jsac/LiuWTWG09" mdate="2023-06-26">
<author pid="01/6541">Benyuan Liu</author>
<author pid="37/800">C&#233;dric Westphal</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Donald F. Towsley</author>
<author pid="44/4357">Liaoruo Wang</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Asymptotic Connectivity Properties of Cooperative Wireless Ad Hoc Networks.</title>
<pages>1226-1237</pages>
<year>2009</year>
<volume>27</volume>
<journal>IEEE J. Sel. Areas Commun.</journal>
<number>7</number>
<ee>https://doi.org/10.1109/JSAC.2009.090918</ee>
<url>db/journals/jsac/jsac27.html#LiuWTWG09</url>
</article>
</r>
<r><article key="journals/phycomm/LiuMGO09" mdate="2025-03-03">
<author orcid="0000-0001-7419-2947" pid="69/1097-2">Huaping Liu 0002</author>
<author pid="54/2683">Andreas F. Molisch</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="10/3164">Philip V. Orlik</author>
<title>Hybrid coherent and frequency-shifted-reference ultrawideband radio.</title>
<pages>265-273</pages>
<year>2009</year>
<volume>2</volume>
<journal>Phys. Commun.</journal>
<number>4</number>
<ee>https://doi.org/10.1016/j.phycom.2009.06.003</ee>
<url>db/journals/phycomm/phycomm2.html#LiuMGO09</url>
</article>
</r>
<r><article key="journals/twc/DingLGT09" mdate="2023-06-26">
<author pid="64/361-1">Zhiguo Ding 0001</author>
<author pid="04/2707">Kin K. Leung</author>
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Donald F. Towsley</author>
<title>On the study of network coding with diversity.</title>
<pages>1247-1259</pages>
<year>2009</year>
<volume>8</volume>
<journal>IEEE Trans. Wirel. Commun.</journal>
<number>3</number>
<ee>https://doi.org/10.1109/TWC.2009.07051022</ee>
<url>db/journals/twc/twc8.html#DingLGT09</url>
</article>
</r>
<r><article key="journals/twc/XuGJ09" mdate="2024-05-07">
<author pid="37/5126">Jie Xu</author>
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-3222-0812" pid="73/6748">Ramakrishna Janaswamy</author>
<title>The capacity of MIMO systems with increasing SNR by electromagnetic analysis.</title>
<pages>4752-4761</pages>
<year>2009</year>
<volume>8</volume>
<journal>IEEE Trans. Wirel. Commun.</journal>
<number>9</number>
<ee>https://doi.org/10.1109/TWC.2009.081326</ee>
<url>db/journals/twc/twc8.html#XuGJ09</url>
</article>
</r>
<r><inproceedings key="conf/isit/DingGLT09" mdate="2023-06-26">
<author pid="64/361-1">Zhiguo Ding 0001</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="04/2707">Kin K. Leung</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<title>Application of joint source-relay scheduling to cooperative multiple access channels.</title>
<pages>1011-1015</pages>
<year>2009</year>
<booktitle>ISIT</booktitle>
<ee>https://doi.org/10.1109/ISIT.2009.5206073</ee>
<crossref>conf/isit/2009</crossref>
<url>db/conf/isit/isit2009.html#DingGLT09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mobicom/VasudevanTGK09" mdate="2025-03-03">
<author pid="05/4289">Sudarshan Vasudevan</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Donald F. Towsley</author>
<author orcid="0000-0002-4190-9515" pid="77/910">Dennis Goeckel</author>
<author pid="90/4201">Ramin Khalili</author>
<title>Neighbor discovery in wireless networks and the coupon collector's problem.</title>
<pages>181-192</pages>
<year>2009</year>
<booktitle>MobiCom</booktitle>
<ee>https://doi.org/10.1145/1614320.1614341</ee>
<crossref>conf/mobicom/2009</crossref>
<url>db/conf/mobicom/mobicom2009.html#VasudevanTGK09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pimrc/ShengGLD09" mdate="2020-01-28">
<author pid="55/3503">Zhengguo Sheng</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="04/2707">Kin K. Leung</author>
<author pid="64/361-1">Zhiguo Ding 0001</author>
<title>A stochastic geometry approach to transmission capacity in wireless cooperative networks.</title>
<pages>622-626</pages>
<year>2009</year>
<booktitle>PIMRC</booktitle>
<ee>https://doi.org/10.1109/PIMRC.2009.5449858</ee>
<crossref>conf/pimrc/2009</crossref>
<url>db/conf/pimrc/pimrc2009.html#ShengGLD09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acssc/JoshiLMCG08" mdate="2023-01-05">
<author pid="278/8163">Harshit Joshi</author>
<author pid="154/6486">Zhiguo Lai</author>
<author pid="117/5586">Kyle Morrison</author>
<author pid="37/9508">Cagatay Capar</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Optimization of frequency-shifted reference ultrawideband systems.</title>
<pages>1996-2000</pages>
<year>2008</year>
<booktitle>ACSCC</booktitle>
<ee>https://doi.org/10.1109/ACSSC.2008.5074781</ee>
<crossref>conf/acssc/2008</crossref>
<url>db/conf/acssc/acssc2008.html#JoshiLMCG08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/allerton/HardwickGT08" mdate="2023-12-17">
<author pid="361/1929">Kery Hardwick</author>
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Don Towsley</author>
<title>Modeling distributed beamforming in wireless networks.</title>
<pages>475-482</pages>
<year>2008</year>
<booktitle>Allerton</booktitle>
<ee>https://doi.org/10.1109/ALLERTON.2008.4797596</ee>
<crossref>conf/allerton/2008</crossref>
<url>db/conf/allerton/allerton2008.html#HardwickGT08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mobihoc/WangLGTW08" mdate="2023-06-26">
<author pid="44/4357">Liaoruo Wang</author>
<author pid="01/6541">Benyuan Liu</author>
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Donald F. Towsley</author>
<author pid="37/800">C&#233;dric Westphal</author>
<title>Connectivity in cooperative wireless ad hoc networks.</title>
<pages>121-130</pages>
<year>2008</year>
<booktitle>MobiHoc</booktitle>
<ee>https://doi.org/10.1145/1374618.1374636</ee>
<crossref>conf/mobihoc/2008</crossref>
<url>db/conf/mobihoc/mobihoc2008.html#WangLGTW08</url>
</inproceedings>
</r>
<r><article key="journals/icl/ZhangG07" mdate="2020-08-20">
<author pid="40/2812">Honglei Zhang</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Peak Power Reduction in Closed-Loop MIMO-OFDM Systems via Mode Reservation.</title>
<pages>583-585</pages>
<year>2007</year>
<volume>11</volume>
<journal>IEEE Commun. Lett.</journal>
<number>7</number>
<ee>https://doi.org/10.1109/LCOMM.2007.070275</ee>
<url>db/journals/icl/icl11.html#ZhangG07</url>
</article>
</r>
<r><article key="journals/jstsp/SadlerGHVX07" mdate="2022-06-23">
<author orcid="0000-0002-9564-3812" pid="26/3347">Brian M. Sadler</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="h/MichaelLHonig">Michael L. Honig</author>
<author orcid="0000-0003-4249-585X" pid="29/6532">Alle-Jan van der Veen</author>
<author pid="62/1262">Zhengyuan Xu</author>
<title>Introduction to the Issue on Performance Limits of Ultra-Wideband Systems.</title>
<pages>337-339</pages>
<year>2007</year>
<volume>1</volume>
<journal>J. Sel. Topics Signal Processing</journal>
<number>3</number>
<ee>https://doi.org/10.1109/JSTSP.2007.907414</ee>
<url>db/journals/jstsp/jstsp1.html#SadlerGHVX07</url>
</article>
</r>
<r><article key="journals/pieee/ZhangWAG07" mdate="2020-10-02">
<author pid="40/2812">Honglei Zhang</author>
<author pid="04/1738">Shuangqing Wei</author>
<author pid="67/4767">Ganesh Ananthaswamy</author>
<author pid="77/910">Dennis L. Goeckel</author>
<title>Adaptive Signaling Based on Statistical Characterizations of Outdated Feedback in Wireless Communications.</title>
<pages>2337-2353</pages>
<year>2007</year>
<volume>95</volume>
<journal>Proc. IEEE</journal>
<number>12</number>
<ee>https://doi.org/10.1109/JPROC.2007.907127</ee>
<url>db/journals/pieee/pieee95.html#ZhangWAG07</url>
</article>
</r>
<r><article key="journals/tcom/GoeckelZ07" mdate="2020-09-01">
<author pid="77/910">Dennis Goeckel</author>
<author pid="57/5249">Qu Zhang</author>
<title>Slightly Frequency-Shifted Reference Ultra-Wideband (UWB) Radio.</title>
<pages>508-519</pages>
<year>2007</year>
<volume>55</volume>
<journal>IEEE Trans. Commun.</journal>
<number>3</number>
<ee>https://doi.org/10.1109/TCOMM.2007.892452</ee>
<url>db/journals/tcom/tcom55.html#GoeckelZ07</url>
</article>
</r>
<r><inproceedings key="conf/globecom/LiuMZGO07" mdate="2025-03-03">
<author orcid="0000-0001-7419-2947" pid="69/1097-2">Huaping Liu 0002</author>
<author pid="54/2683">Andreas F. Molisch</author>
<author pid="12/6839">Shiwei Zhao</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="10/3164">Philip V. Orlik</author>
<title>Hybrid Coherent and Frequency-Shifted-Reference Ultrawideband Radio.</title>
<pages>4106-4111</pages>
<year>2007</year>
<booktitle>GLOBECOM</booktitle>
<ee>https://doi.org/10.1109/GLOCOM.2007.781</ee>
<crossref>conf/globecom/2007</crossref>
<url>db/conf/globecom/globecom2007.html#LiuMZGO07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icc/ZhangG07" mdate="2017-05-25">
<author pid="57/5249">Qu Zhang</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Multiple-Access Slightly Frequency-Shifted Reference Ultra-Wideband Communications for Dense Multipath Channels.</title>
<pages>1083-1088</pages>
<year>2007</year>
<booktitle>ICC</booktitle>
<ee>https://doi.org/10.1109/ICC.2007.184</ee>
<crossref>conf/icc/2007</crossref>
<url>db/conf/icc/icc2007.html#ZhangG07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/infocom/LiuGT07" mdate="2023-06-26">
<author pid="83/277">Junning Liu</author>
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Donald F. Towsley</author>
<title>Bounds on the Gain of Network Coding and Broadcasting in Wireless Networks.</title>
<pages>724-732</pages>
<year>2007</year>
<crossref>conf/infocom/2007</crossref>
<booktitle>INFOCOM</booktitle>
<ee>https://doi.org/10.1109/INFCOM.2007.90</ee>
<url>db/conf/infocom/infocom2007.html#LiuGT07</url>
</inproceedings>
</r>
<r><article key="journals/spm/ScaglioneGL06" mdate="2021-02-24">
<author pid="61/1706">Anna Scaglione</author>
<author pid="77/910">Dennis L. Goeckel</author>
<author pid="35/4573">J. Nicholas Laneman</author>
<title>Cooperative communications in mobile ad hoc networks.</title>
<pages>18-29</pages>
<year>2006</year>
<volume>23</volume>
<journal>IEEE Signal Process. Mag.</journal>
<number>5</number>
<ee>https://doi.org/10.1109/MSP.2006.1708409</ee>
<url>db/journals/spm/spm23.html#ScaglioneGL06</url>
</article>
</r>
<r><article key="journals/twc/WeiGV06" mdate="2025-03-03">
<author pid="04/1738">Shuangqing Wei</author>
<author orcid="0000-0002-4190-9515" pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0001-6089-0509" pid="90/1227">Matthew C. Valenti</author>
<title>Asynchronous cooperative diversity.</title>
<pages>1547-1557</pages>
<year>2006</year>
<volume>5</volume>
<journal>IEEE Trans. Wirel. Commun.</journal>
<number>6</number>
<ee>https://doi.org/10.1109/TWC.2006.1638675</ee>
<url>db/journals/twc/twc5.html#WeiGV06</url>
</article>
</r>
<r><article key="journals/vlsisp/ZhangGWW06" mdate="2020-05-20">
<author pid="40/2812">Honglei Zhang</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="04/1738">Shuangqing Wei</author>
<author orcid="0000-0002-8573-0488" pid="21/4583">Moe Z. Win</author>
<title>Rapid Hybrid Acquisition of Ultra-Wideband Signals.</title>
<pages>7-23</pages>
<year>2006</year>
<volume>43</volume>
<journal>J. VLSI Signal Process.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s11265-006-7277-z</ee>
<url>db/journals/vlsisp/vlsisp43.html#ZhangGWW06</url>
</article>
</r>
<r><inproceedings key="conf/ciss/ZhangG06" mdate="2023-05-10">
<author pid="57/5249">Qu Zhang</author>
<author pid="77/910">Dennis L. Goeckel</author>
<title>Multi-Differential Slightly Frequency-Shifted Reference Ultra-wideband (UWB) Radio.</title>
<pages>615-620</pages>
<year>2006</year>
<booktitle>CISS</booktitle>
<ee>https://doi.org/10.1109/CISS.2006.286542</ee>
<crossref>conf/ciss/2006</crossref>
<url>db/conf/ciss/ciss2006.html#ZhangG06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fpga/AtienoAGT06" mdate="2025-01-19">
<author pid="04/1556">Lilian Atieno</author>
<author pid="43/32">Jonathan Allen</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="23/2353">Russell Tessier</author>
<title>An adaptive Reed-Solomon errors-and-erasures decoder.</title>
<pages>150-158</pages>
<year>2006</year>
<crossref>conf/fpga/2006</crossref>
<booktitle>FPGA</booktitle>
<ee>https://doi.org/10.1145/1117201.1117224</ee>
<ee>https://www.wikidata.org/entity/Q130988944</ee>
<url>db/conf/fpga/fpga2006.html#AtienoAGT06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/globecom/VeronesiG06" mdate="2020-02-21">
<author pid="72/4544">Daniele Veronesi</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Multiple Frequency Offset Compensation in Cooperative Wireless Systems.</title>
<year>2006</year>
<crossref>conf/globecom/2006</crossref>
<booktitle>GLOBECOM</booktitle>
<ee>https://doi.org/10.1109/GLOCOM.2006.120</ee>
<url>db/conf/globecom/globecom2006.html#VeronesiG06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/globecom/XuYG06" mdate="2020-02-21">
<author pid="41/4264">Huilin Xu</author>
<author pid="52/6918-1">Liuqing Yang 0001</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Digital Multi-Carrier Differential Signaling for UWB Radios.</title>
<year>2006</year>
<crossref>conf/globecom/2006</crossref>
<booktitle>GLOBECOM</booktitle>
<ee>https://doi.org/10.1109/GLOCOM.2006.749</ee>
<url>db/conf/globecom/globecom2006.html#XuYG06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/globecom/ZhangGA06" mdate="2020-02-21">
<author pid="40/2812">Honglei Zhang</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="67/4767">Ganesh Ananthaswamy</author>
<title>Adaptive Modulation in MIMO Eigen beamforming with Outdated Channel State Information.</title>
<year>2006</year>
<crossref>conf/globecom/2006</crossref>
<booktitle>GLOBECOM</booktitle>
<ee>https://doi.org/10.1109/GLOCOM.2006.795</ee>
<url>db/conf/globecom/globecom2006.html#ZhangGA06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/infocom/SongGT06" mdate="2023-06-26">
<author pid="66/602">Sanquan Song</author>
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Donald F. Towsley</author>
<title>Collaboration Improves the Connectivity of Wireless Networks.</title>
<year>2006</year>
<crossref>conf/infocom/2006</crossref>
<booktitle>INFOCOM</booktitle>
<ee>https://doi.org/10.1109/INFOCOM.2006.121</ee>
<url>db/conf/infocom/infocom2006.html#SongGT06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/infocom/VasudevanZGT06" mdate="2023-06-26">
<author pid="05/4289">Sudarshan Vasudevan</author>
<author pid="77/2866">Chun Zhang</author>
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-7808-7375" pid="t/DonaldFTowsley">Donald F. Towsley</author>
<title>Optimal Power Allocation in Wireless Networks with Transmitter-Receiver Power Tradeoffs.</title>
<year>2006</year>
<crossref>conf/infocom/2006</crossref>
<booktitle>INFOCOM</booktitle>
<ee>https://doi.org/10.1109/INFOCOM.2006.297</ee>
<url>db/conf/infocom/infocom2006.html#VasudevanZGT06</url>
</inproceedings>
</r>
<r><article key="journals/tvlsi/TessierSRGB05" mdate="2020-03-11">
<author pid="23/2353">Russell Tessier</author>
<author pid="00/2535">Sriram Swaminathan</author>
<author pid="50/6793">Ramaswamy Ramaswamy</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="b/WaynePBurleson">Wayne P. Burleson</author>
<title>A reconfigurable, power-efficient adaptive Viterbi decoder.</title>
<pages>484-488</pages>
<year>2005</year>
<volume>13</volume>
<journal>IEEE Trans. Very Large Scale Integr. Syst.</journal>
<number>4</number>
<ee>https://doi.org/10.1109/TVLSI.2004.842930</ee>
<url>db/journals/tvlsi/tvlsi13.html#TessierSRGB05</url>
</article>
</r>
<r><article key="journals/twc/WeiGJ05" mdate="2024-05-07">
<author pid="04/1738">Shuangqing Wei</author>
<author pid="77/910">Dennis Goeckel</author>
<author orcid="0000-0002-3222-0812" pid="73/6748">Ramakrishna Janaswamy</author>
<title>On the asymptotic capacity of MIMO systems with antenna arrays of fixed length.</title>
<pages>1608-1621</pages>
<year>2005</year>
<volume>4</volume>
<journal>IEEE Trans. Wirel. Commun.</journal>
<number>4</number>
<ee>https://doi.org/10.1109/TWC.2005.850366</ee>
<url>db/journals/twc/twc4.html#WeiGJ05</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-cs-0509085" mdate="2018-08-13">
<author pid="66/602">Sanquan Song</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="t/DonaldFTowsley">Donald F. Towsley</author>
<title>An Improved Lower Bound to the Number of Neighbors Required for the Asymptotic Connectivity of Ad Hoc Networks</title>
<ee type="oa">http://arxiv.org/abs/cs/0509085</ee>
<year>2005</year>
<journal>CoRR</journal>
<volume>abs/cs/0509085</volume>
<url>db/journals/corr/corr0509.html#abs-cs-0509085</url>
</article>
</r>
<r><article key="journals/tcom/KamathG04" mdate="2020-09-01">
<author pid="29/1146">Krishnanand M. Kamath</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Adaptive-modulation schemes for minimum outage probability in wireless systems.</title>
<pages>1632-1635</pages>
<year>2004</year>
<volume>52</volume>
<journal>IEEE Trans. Commun.</journal>
<number>10</number>
<ee>https://doi.org/10.1109/TCOMM.2004.836439</ee>
<url>db/journals/tcom/tcom52.html#KamathG04</url>
</article>
</r>
<r><article key="journals/vlsisp/JainLBTG04" mdate="2020-05-20">
<author pid="56/2129">Prashant Jain</author>
<author pid="13/5885">Andrew Laffely</author>
<author pid="b/WaynePBurleson">Wayne P. Burleson</author>
<author pid="23/2353">Russell Tessier</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Dynamically Parameterized Algorithms and Architectures to Exploit Signal Variations.</title>
<pages>27-40</pages>
<year>2004</year>
<volume>36</volume>
<journal>J. VLSI Signal Process.</journal>
<number>1</number>
<ee>https://doi.org/10.1023/B:VLSI.0000008068.26922.0b</ee>
<url>db/journals/vlsisp/vlsisp36.html#JainLBTG04</url>
</article>
</r>
<r><inproceedings key="conf/fccm/LiangTG04" mdate="2023-03-24">
<author pid="19/2208">Jian Liang</author>
<author pid="23/2353">Russell Tessier</author>
<author pid="77/910">Dennis Goeckel</author>
<title>A Dynamically-Reconfigurable, Power-Efficient Turbo Decoder.</title>
<pages>91-100</pages>
<year>2004</year>
<crossref>conf/fccm/2004</crossref>
<booktitle>FCCM</booktitle>
<ee>https://doi.org/10.1109/FCCM.2004.3</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/FCCM.2004.3</ee>
<url>db/conf/fccm/fccm2004.html#LiangTG04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icc/GoeckelH04" mdate="2017-05-25">
<author pid="77/910">Dennis Goeckel</author>
<author pid="126/9091">Yonggang Hao</author>
<title>Space-time coding for distributed antenna arrays.</title>
<pages>747-751</pages>
<year>2004</year>
<booktitle>ICC</booktitle>
<ee>https://doi.org/10.1109/ICC.2004.1312601</ee>
<crossref>conf/icc/2004</crossref>
<url>db/conf/icc/icc2004.html#GoeckelH04</url>
</inproceedings>
</r>
<r><article key="journals/icl/WeiG03" mdate="2020-08-20">
<author pid="04/1738">Shuangqing Wei</author>
<author pid="77/910">Dennis Goeckel</author>
<title>On the minimax robustness of the uniform transmission power strategy in MIMO systems.</title>
<pages>523-524</pages>
<year>2003</year>
<volume>7</volume>
<journal>IEEE Commun. Lett.</journal>
<number>11</number>
<ee>https://doi.org/10.1109/LCOMM.2003.820103</ee>
<url>db/journals/icl/icl7.html#WeiG03</url>
</article>
</r>
<r><inproceedings key="conf/icc/WeiGJ03" mdate="2017-05-25">
<author pid="04/1738">Shuangqing Wei</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="73/6748">Ramakrishna Janaswamy</author>
<title>On the asymptotic capacity of MIMO systems with fixed length linear antenna arrays.</title>
<pages>2633-2637</pages>
<year>2003</year>
<booktitle>ICC</booktitle>
<ee>https://doi.org/10.1109/ICC.2003.1204424</ee>
<crossref>conf/icc/2003</crossref>
<url>db/conf/icc/icc2003.html#WeiGJ03</url>
</inproceedings>
</r>
<r><article key="journals/tcom/GoeckelA02" mdate="2020-09-01">
<author pid="77/910">Dennis Goeckel</author>
<author pid="67/4767">Ganesh Ananthaswamy</author>
<title>On the design of multidimensional signal sets for OFDM systems.</title>
<pages>442-452</pages>
<year>2002</year>
<volume>50</volume>
<journal>IEEE Trans. Commun.</journal>
<number>3</number>
<ee>https://doi.org/10.1109/26.990906</ee>
<url>db/journals/tcom/tcom50.html#GoeckelA02</url>
</article>
</r>
<r><article key="journals/tcom/WeiG02a" mdate="2020-09-01">
<author pid="04/1738">Shuangqing Wei</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Error statistics for average power measurements in wireless communication systems.</title>
<pages>1535-1546</pages>
<year>2002</year>
<volume>50</volume>
<journal>IEEE Trans. Commun.</journal>
<number>9</number>
<ee>https://doi.org/10.1109/TCOMM.2002.802569</ee>
<url>db/journals/tcom/tcom50.html#WeiG02a</url>
</article>
</r>
<r><article key="journals/tcom/AnanthaswamyG02" mdate="2020-09-01">
<author pid="67/4767">Ganesh Ananthaswamy</author>
<author pid="77/910">Dennis Goeckel</author>
<title>A fast-acquiring blind predictive DFE.</title>
<pages>1557-1560</pages>
<year>2002</year>
<volume>50</volume>
<journal>IEEE Trans. Commun.</journal>
<number>10</number>
<ee>https://doi.org/10.1109/TCOMM.2002.803978</ee>
<url>db/journals/tcom/tcom50.html#AnanthaswamyG02</url>
</article>
</r>
<r><inproceedings key="conf/fpga/SwaminathanTGB02" mdate="2020-04-06">
<author pid="00/2535">Sriram Swaminathan</author>
<author pid="23/2353">Russell Tessier</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="b/WaynePBurleson">Wayne P. Burleson</author>
<title>A dynamically reconfigurable adaptive viterbi decoder.</title>
<pages>227-236</pages>
<year>2002</year>
<crossref>conf/fpga/2002</crossref>
<booktitle>FPGA</booktitle>
<ee>https://doi.org/10.1145/503048.503081</ee>
<url>db/conf/fpga/fpga2002.html#SwaminathanTGB02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/globecom/LiuGT02" mdate="2017-05-23">
<author pid="01/6541">Benyuan Liu</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="t/DonaldFTowsley">Don Towsley</author>
<title>TCP-cognizant adaptive forward error correction in wireless networks.</title>
<pages>2128-2132</pages>
<year>2002</year>
<booktitle>GLOBECOM</booktitle>
<ee>https://doi.org/10.1109/GLOCOM.2002.1189008</ee>
<crossref>conf/globecom/2002</crossref>
<url>db/conf/globecom/globecom2002.html#LiuGT02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icc/WeiGK02" mdate="2017-05-25">
<author pid="04/1738">Shuangqing Wei</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="52/1666">Patrick A. Kelly</author>
<title>A modern extreme value theory approach to calculating the distribution of the peak-to-average power ratio in OFDM systems.</title>
<pages>1686-1690</pages>
<year>2002</year>
<booktitle>ICC</booktitle>
<ee>https://doi.org/10.1109/ICC.2002.997136</ee>
<crossref>conf/icc/2002</crossref>
<url>db/conf/icc/icc2002.html#WeiGK02</url>
</inproceedings>
</r>
<r><article key="journals/tcom/OrmeciLGW01" mdate="2024-05-13">
<author pid="83/10924">Pinar &#214;rmeci</author>
<author pid="83/6609-2">Xueting Liu 0002</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="51/5171">Richard D. Wesel</author>
<title>Adaptive bit-interleaved coded modulation.</title>
<pages>1572-1581</pages>
<year>2001</year>
<volume>49</volume>
<journal>IEEE Trans. Commun.</journal>
<number>9</number>
<ee>https://doi.org/10.1109/26.950344</ee>
<url>db/journals/tcom/tcom49.html#OrmeciLGW01</url>
</article>
</r>
<r><inproceedings key="conf/globecom/KamathG01" mdate="2017-05-23">
<author pid="29/1146">Krishnanand M. Kamath</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Adaptive modulation schemes for minimum outage probability in wireless systems.</title>
<pages>1267-1271</pages>
<year>2001</year>
<booktitle>GLOBECOM</booktitle>
<ee>https://doi.org/10.1109/GLOCOM.2001.965690</ee>
<crossref>conf/globecom/2001</crossref>
<url>db/conf/globecom/globecom2001.html#KamathG01</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icassp/BurlesonTGSJEVT01" mdate="2023-03-23">
<author pid="b/WaynePBurleson">Wayne P. Burleson</author>
<author pid="23/2353">Russell Tessier</author>
<author pid="77/910">Dennis Goeckel</author>
<author pid="00/2535">Sriram Swaminathan</author>
<author pid="56/2129">Prashant Jain</author>
<author pid="29/710">Jeongseon Euh</author>
<author pid="43/6550">Subramanian Venkatraman</author>
<author pid="139/9496">Vidhya Thyagarajan</author>
<title>Dynamically parameterized algorithms and architectures to exploit signal variations for improved performance and reduced power.</title>
<pages>901-904</pages>
<year>2001</year>
<booktitle>ICASSP</booktitle>
<ee>https://doi.org/10.1109/ICASSP.2001.941061</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICASSP.2001.941061</ee>
<crossref>conf/icassp/2001</crossref>
<url>db/conf/icassp/icassp2001.html#BurlesonTGSJEVT01</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icc/AnanthaswamyG01" mdate="2017-05-25">
<author pid="67/4767">Ganesh Ananthaswamy</author>
<author pid="77/910">Dennis Goeckel</author>
<title>A fast-converging blind predictive DFE.</title>
<pages>1068-1072</pages>
<year>2001</year>
<booktitle>ICC</booktitle>
<ee>https://doi.org/10.1109/ICC.2001.936809</ee>
<crossref>conf/icc/2001</crossref>
<url>db/conf/icc/icc2001.html#AnanthaswamyG01</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icc/WeiG01" mdate="2017-05-25">
<author pid="04/1738">Shuangqing Wei</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Error statistics for average power measurements in wireless communication systems.</title>
<pages>1073-1077</pages>
<year>2001</year>
<booktitle>ICC</booktitle>
<ee>https://doi.org/10.1109/ICC.2001.936813</ee>
<crossref>conf/icc/2001</crossref>
<url>db/conf/icc/icc2001.html#WeiG01</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icc/LiuOWG01" mdate="2024-05-13">
<author pid="83/6609-2">Xueting Liu 0002</author>
<author pid="83/10924">Pinar &#214;rmeci</author>
<author pid="51/5171">Richard D. Wesel</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Bandwidth-efficient, low-latency adaptive coded modulation schemes for time-varying channels.</title>
<pages>2211-2215</pages>
<year>2001</year>
<booktitle>ICC</booktitle>
<ee>https://doi.org/10.1109/ICC.2001.937048</ee>
<crossref>conf/icc/2001</crossref>
<url>db/conf/icc/icc2001.html#LiuOWG01</url>
</inproceedings>
</r>
<r><article key="journals/tcom/GoeckelS00" mdate="2020-09-01">
<author pid="77/910">Dennis Goeckel</author>
<author pid="00/1158">Wayne E. Stark</author>
<title>Optimal diversity allocation in multiuser communication systems. II. Optimization.</title>
<pages>45-52</pages>
<year>2000</year>
<volume>48</volume>
<journal>IEEE Trans. Commun.</journal>
<number>1</number>
<ee>https://doi.org/10.1109/26.818872</ee>
<url>db/journals/tcom/tcom48.html#GoeckelS00</url>
</article>
</r>
<r><article key="journals/tcom/KoseG00" mdate="2020-09-01">
<author pid="99/5886">Cenk K&#246;se</author>
<author pid="77/910">Dennis Goeckel</author>
<title>On power adaptation in adaptive signaling systems.</title>
<pages>1769-1773</pages>
<year>2000</year>
<volume>48</volume>
<journal>IEEE Trans. Commun.</journal>
<number>11</number>
<ee>https://doi.org/10.1109/26.886464</ee>
<url>db/journals/tcom/tcom48.html#KoseG00</url>
</article>
</r>
<r><inproceedings key="conf/wcnc/KoseG00" mdate="2017-05-24">
<author pid="99/5886">Cenk K&#246;se</author>
<author pid="77/910">Dennis Goeckel</author>
<title>Minimum complexity sequential multihypothesis detection: weak sequential tests.</title>
<pages>129-133</pages>
<year>2000</year>
<booktitle>WCNC</booktitle>
<ee>https://doi.org/10.1109/WCNC.2000.904613</ee>
<crossref>conf/wcnc/2000</crossref>
<url>db/conf/wcnc/wcnc2000.html#KoseG00</url>
</inproceedings>
</r>
<r><article key="journals/tcom/Goeckel99" mdate="2025-03-03">
<author orcid="0000-0002-4190-9515" pid="77/910">Dennis Goeckel</author>
<title>Adaptive coding for time-varying channels using outdated fading estimates.</title>
<pages>844-855</pages>
<year>1999</year>
<volume>47</volume>
<journal>IEEE Trans. Commun.</journal>
<number>6</number>
<ee>https://doi.org/10.1109/26.771341</ee>
<url>db/journals/tcom/tcom47.html#Goeckel99</url>
</article>
</r>
<r><article key="journals/tcom/GoeckelS99" mdate="2020-09-01">
<author pid="77/910">Dennis Goeckel</author>
<author pid="00/1158">Wayne E. Stark</author>
<title>Optimal diversity allocation in multiuser communication systems. I. System model.</title>
<pages>1828-1836</pages>
<year>1999</year>
<volume>47</volume>
<journal>IEEE Trans. Commun.</journal>
<number>12</number>
<ee>https://doi.org/10.1109/26.809703</ee>
<url>db/journals/tcom/tcom47.html#GoeckelS99</url>
</article>
</r>
<r><inproceedings key="conf/icc/Goeckel99" mdate="2020-11-23">
<author pid="77/910">Dennis L. Goeckel</author>
<title>Coded modulation with non-standard signal sets for wireless OFDM systems.</title>
<pages>791-795</pages>
<year>1999</year>
<booktitle>ICC</booktitle>
<ee>https://doi.org/10.1109/ICC.1999.765382</ee>
<crossref>conf/icc/1999</crossref>
<url>db/conf/icc/icc1999.html#Goeckel99</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wcnc/GoeckelA99" mdate="2017-05-24">
<author pid="77/910">Dennis Goeckel</author>
<author pid="67/4767">Ganesh Ananthaswamy</author>
<title>Increasing diversity with non-standard signal sets in wireless OFDM systems.</title>
<pages>20-24</pages>
<year>1999</year>
<booktitle>WCNC</booktitle>
<ee>https://doi.org/10.1109/WCNC.1999.797778</ee>
<crossref>conf/wcnc/1999</crossref>
<url>db/conf/wcnc/wcnc1999.html#GoeckelA99</url>
</inproceedings>
</r>
<r><article key="journals/tsp/GoeckelHS98" mdate="2020-03-10">
<author pid="77/910">Dennis Goeckel</author>
<author pid="h/AlfredOHeroIII">Alfred O. Hero III</author>
<author pid="00/1158">Wayne E. Stark</author>
<title>Data-recursive algorithms for blind channel identification in oversampled communication systems.</title>
<pages>2217-2220</pages>
<year>1998</year>
<volume>46</volume>
<journal>IEEE Trans. Signal Process.</journal>
<number>8</number>
<ee>https://doi.org/10.1109/78.705439</ee>
<url>db/journals/tsp/tsp46.html#GoeckelHS98</url>
</article>
</r>
<r><inproceedings key="conf/icc/Goeckel98" mdate="2020-12-15">
<author pid="77/910">Dennis L. Goeckel</author>
<title>Strongly robust adaptive signaling for time-varying channels.</title>
<pages>454-458</pages>
<year>1998</year>
<booktitle>ICC</booktitle>
<ee>https://doi.org/10.1109/ICC.1998.682895</ee>
<crossref>conf/icc/1998</crossref>
<url>db/conf/icc/icc1998.html#Goeckel98</url>
</inproceedings>
</r>
<r><article key="journals/ett/GoeckelS95" mdate="2020-05-18">
<author pid="77/910">Dennis Goeckel</author>
<author pid="00/1158">Wayne E. Stark</author>
<title>Performance of coded direct-sequence systems with rake reception in a multipath fading environment.</title>
<pages>41-51</pages>
<year>1995</year>
<volume>6</volume>
<journal>Eur. Trans. Telecommun.</journal>
<number>1</number>
<ee>https://doi.org/10.1002/ett.4460060109</ee>
<url>db/journals/ett/ett6.html#GoeckelS95</url>
</article>
</r>
<coauthors n="134" nc="1">
<co c="0"><na f="a/Adams:Stephan" pid="95/10496">Stephan Adams</na></co>
<co c="0"><na f="a/Adler:Micah" pid="a/MicahAdler">Micah Adler</na></co>
<co c="0"><na f="a/Allen:Jonathan" pid="43/32">Jonathan Allen</na></co>
<co c="0"><na f="a/Ananthaswamy:Ganesh" pid="67/4767">Ganesh Ananthaswamy</na></co>
<co c="0"><na f="a/Atieno:Lilian" pid="04/1556">Lilian Atieno</na></co>
<co c="0"><na f="a/Azmi:Paeiz" pid="64/3376">Paeiz Azmi</na></co>
<co c="0"><na f="b/Badov:Misha" pid="160/5912">Misha Badov</na></co>
<co c="0"><na f="b/Bahramali:Alireza" pid="225/5499">Alireza Bahramali</na></co>
<co c="0"><na f="b/Bash:Boulat_A=" pid="59/4744">Boulat A. Bash</na></co>
<co c="0"><na f="b/Bhanage:Gautam_D=" pid="17/4296">Gautam D. Bhanage</na></co>
<co c="0"><na f="b/Bisdikian:Chatschik" pid="18/1840">Chatschik Bisdikian</na></co>
<co c="0"><na f="b/Bozorgi:Ardavan" pid="356/5437">Ardavan Bozorgi</na></co>
<co c="0"><na f="b/Burleson:Wayne_P=" pid="b/WaynePBurleson">Wayne P. Burleson</na></co>
<co c="0"><na f="c/Capar:Cagatay" pid="37/9508">Cagatay Capar</na></co>
<co c="0"><na f="c/Chen:Minting" pid="270/2181">Minting Chen</na></co>
<co c="0"><na f="c/Cohen_0001:Asaf" pid="18/1993-1">Asaf Cohen 0001</na></co>
<co c="0"><na f="c/Collings:Iain_B=" pid="07/3441">Iain B. Collings</na></co>
<co c="0"><na f="d/Dagefu:Fikadu_T=" pid="33/8959">Fikadu T. Dagefu</na></co>
<co c="0"><na f="d/Dehghan:Mostafa" pid="46/8356">Mostafa Dehghan</na></co>
<co c="0"><na f="d/Ding_0001:Zhiguo" pid="64/361-1">Zhiguo Ding 0001</na></co>
<co c="0"><na f="d/Dolatshahi:Sepideh" pid="29/10031">Sepideh Dolatshahi</na></co>
<co c="0"><na f="d/D=ouml=rpinghaus:Meik" pid="98/4349">Meik D&#246;rpinghaus</na></co>
<co c="0"><na f="d/Doty:James_M=" pid="370/9419">James M. Doty</na></co>
<co c="0"><na f="d/Duarte:Marco_F=" pid="157/8095">Marco F. Duarte</na></co>
<co c="0"><na f="e/Enayati:Saeede" pid="178/3880">Saeede Enayati</na></co>
<co c="0"><na f="e/Esmat:Haitham_H=" pid="199/0908">Haitham H. Esmat</na></co>
<co c="0"><na f="e/Euh:Jeongseon" pid="29/710">Jeongseon Euh</na></co>
<co c="0"><na f="f/Fettweis:Gerhard_P=" pid="f/GFettweis">Gerhard P. Fettweis</na></co>
<co c="0"><na f="f/Fofack:Nicaise_Choungmo" pid="120/0237">Nicaise Choungmo Fofack</na></co>
<co c="0"><na f="f/Forouzesh:Moslem" pid="211/5954">Moslem Forouzesh</na></co>
<co c="0"><na f="g/Ganesan:Deepak" pid="g/DeepakGanesan">Deepak Ganesan</na></co>
<co c="0"><na f="g/Ghaderi:Majid" pid="78/4129">Majid Ghaderi</na></co>
<co c="0"><na f="g/Ghafari:Amirhossein" pid="248/1723">Amirhossein Ghafari</na></co>
<co c="0"><na f="g/Gheorghe:Andrei_H=" pid="144/7541">Andrei H. Gheorghe</na></co>
<co c="0"><na f="g/Gillani:Amna" pid="278/1497">Amna Gillani</na></co>
<co c="0"><na f="g/Guan_0001:Bo" pid="50/1147-1">Bo Guan 0001</na></co>
<co c="0"><na f="g/Guha_0001:Saikat" pid="42/5459-1">Saikat Guha 0001</na></co>
<co c="0"><na f="g/Gurewitz:Omer" pid="16/6327">Omer Gurewitz</na></co>
<co c="0"><na f="h/Habif:Jonathan_L=" pid="74/10945">Jonathan L. Habif</na></co>
<co c="0"><na f="h/Hancock:Robert_E=" pid="52/9826">Robert E. Hancock</na></co>
<co c="0" n="2"><na f="h/Hanly:Stephen_Vaughan" pid="25/3433">Stephen Vaughan Hanly</na><na>Stephen V. Hanly</na></co>
<co c="-1"><na f="h/Hao:Yonggang" pid="126/9091">Yonggang Hao</na></co>
<co c="0"><na f="h/Hardwick:Kery" pid="361/1929">Kery Hardwick</na></co>
<co c="0"><na f="h/He_0001:Ting" pid="52/854-1">Ting He 0001</na></co>
<co c="0"><na f="h/Hero_III:Alfred_O=" pid="h/AlfredOHeroIII">Alfred O. Hero III</na></co>
<co c="0"><na f="h/Honig:Michael_L=" pid="h/MichaelLHonig">Michael L. Honig</na></co>
<co c="0"><na f="h/Houmansadr:Amir" pid="22/1797">Amir Houmansadr</na></co>
<co c="0"><na f="j/Jackson:Robert_W=" pid="90/10179">Robert W. Jackson</na></co>
<co c="0"><na f="j/Jain:Prashant" pid="56/2129">Prashant Jain</na></co>
<co c="0"><na f="j/Janaswamy:Ramakrishna" pid="73/6748">Ramakrishna Janaswamy</na></co>
<co c="0"><na f="j/Jiang_0003:Bo" pid="34/2005-3">Bo Jiang 0003</na></co>
<co c="0"><na f="j/Joshi:Harshit" pid="278/8163">Harshit Joshi</na></co>
<co c="-1"><na f="k/Kamath:Krishnanand_M=" pid="29/1146">Krishnanand M. Kamath</na></co>
<co c="0"><na f="k/Kaplan:Lance_M=" pid="47/4107">Lance M. Kaplan</na></co>
<co c="0"><na f="k/Kelly:Patrick_A=" pid="52/1666">Patrick A. Kelly</na></co>
<co c="0"><na f="k/Khalili:Ramin" pid="90/4201">Ramin Khalili</na></co>
<co c="0"><na f="k/K=ouml=se:Cenk" pid="99/5886">Cenk K&#246;se</na></co>
<co c="0" n="2"><na f="k/Kurose:James_F=" pid="k/JamesFKurose">James F. Kurose</na><na>Jim Kurose</na></co>
<co c="0"><na f="l/Laffely:Andrew" pid="13/5885">Andrew Laffely</na></co>
<co c="0"><na f="l/Lai:Zhiguo" pid="154/6486">Zhiguo Lai</na></co>
<co c="0"><na f="l/Laneman:J=_Nicholas" pid="35/4573">J. Nicholas Laneman</na></co>
<co c="0"><na f="l/Leow:Chee_Yen" pid="19/9372">Chee Yen Leow</na></co>
<co c="0"><na f="l/Leung:Kin_K=" pid="04/2707">Kin K. Leung</na></co>
<co c="0"><na f="l/Li_0046:Ke" pid="75/6627-46">Ke Li 0046</na></co>
<co c="0"><na f="l/Liang:Jian" pid="19/2208">Jian Liang</na></co>
<co c="0"><na f="l/Liu:Benyuan" pid="01/6541">Benyuan Liu</na></co>
<co c="0"><na f="l/Liu_0002:Huaping" pid="69/1097-2">Huaping Liu 0002</na></co>
<co c="0"><na f="l/Liu:Junning" pid="83/277">Junning Liu</na></co>
<co c="0"><na f="l/Liu:X=" pid="36/677">X. Liu</na></co>
<co c="0"><na f="l/Liu:Xiaofan" pid="42/6759">Xiaofan Liu</na></co>
<co c="0"><na f="l/Liu_0002:Xueting" pid="83/6609-2">Xueting Liu 0002</na></co>
<co c="0"><na f="l/Lorenzo:Beatriz" pid="58/7964">Beatriz Lorenzo</na></co>
<co c="0" n="2"><na f="m/Menasch=eacute=:Daniel_Sadoc" pid="44/4915">Daniel Sadoc Menasch&#233;</na><na>Daniel S. Menasch&#233;</na></co>
<co c="0"><na f="m/Mokari:Nader" pid="31/8209">Nader Mokari</na></co>
<co c="0"><na f="m/Molisch:Andreas_F=" pid="54/2683">Andreas F. Molisch</na></co>
<co c="0"><na f="m/Morrison:Kyle" pid="117/5586">Kyle Morrison</na></co>
<co c="0"><na f="n/Nasr:Milad" pid="187/8997">Milad Nasr</na></co>
<co c="0"><na f="o/Orda:Ariel" pid="65/1175">Ariel Orda</na></co>
<co c="0"><na f="o/Orlik:Philip_V=" pid="10/3164">Philip V. Orlik</na></co>
<co c="0"><na f="=/=Ouml=rmeci:Pinar" pid="83/10924">Pinar &#214;rmeci</na></co>
<co c="0"><na f="p/Paar:Christof" pid="p/ChristofPaar">Christof Paar</na></co>
<co c="0"><na f="p/Patel:Monika" pid="144/7760">Monika Patel</na></co>
<co c="0"><na f="p/Paterson:Kenneth_G=" pid="39/780">Kenneth G. Paterson</na></co>
<co c="0"><na f="p/Pishro=Nik:Hossein" pid="72/4747">Hossein Pishro-Nik</na></co>
<co c="0"><na f="p/Polak:Adam_C=" pid="19/10031">Adam C. Polak</na></co>
<co c="0"><na f="q/Quaglia:Elizabeth_A=" pid="52/8437">Elizabeth A. Quaglia</na></co>
<co c="0"><na f="r/Raghavendra:Ramya" pid="88/5233">Ramya Raghavendra</na></co>
<co c="0"><na f="r/Ramaswamy:Ramaswamy" pid="50/6793">Ramaswamy Ramaswamy</na></co>
<co c="0"><na f="r/Ramtin:Amir_Reza" pid="267/7626">Amir Reza Ramtin</na></co>
<co c="0"><na f="r/Rezaei:Fatemeh" pid="85/10059">Fatemeh Rezaei</na></co>
<co c="0"><na f="s/Sadler:Brian_M=" pid="26/3347">Brian M. Sadler</na></co>
<co c="0"><na f="s/Scaglione:Anna" pid="61/1706">Anna Scaglione</na></co>
<co c="0"><na f="s/Seetharam:Anand" pid="16/599">Anand Seetharam</na></co>
<co c="0"><na f="s/Sheikholeslami:Azadeh" pid="73/11343">Azadeh Sheikholeslami</na></co>
<co c="0"><na f="s/Shejwalkar:Virat" pid="243/3113">Virat Shejwalkar</na></co>
<co c="0"><na f="s/Sheng:Zhengguo" pid="55/3503">Zhengguo Sheng</na></co>
<co c="0"><na f="s/Shifrin:Mark" pid="10/6671">Mark Shifrin</na></co>
<co c="0"><na f="s/Sobers:Tamara_V=" pid="176/8109">Tamara V. Sobers</na></co>
<co c="0"><na f="s/Soltani:Ramin" pid="178/5177">Ramin Soltani</na></co>
<co c="0"><na f="s/Song:Sanquan" pid="66/602">Sanquan Song</na></co>
<co c="0"><na f="s/Staat:Paul" pid="276/5458">Paul Staat</na></co>
<co c="0"><na f="s/Stark:Wayne_E=" pid="00/1158">Wayne E. Stark</na></co>
<co c="0"><na f="s/Swami:Ananthram" pid="89/5072">Ananthram Swami</na></co>
<co c="0"><na f="s/Swaminathan:Sriram" pid="00/2535">Sriram Swaminathan</na></co>
<co c="0"><na f="t/Takbiri:Nazanin" pid="199/8925">Nazanin Takbiri</na></co>
<co c="0"><na f="t/Teshnizi:Ali_Mohammadi" pid="352/3911">Ali Mohammadi Teshnizi</na></co>
<co c="0"><na f="t/Tessier:Russell" pid="23/2353">Russell Tessier</na></co>
<co c="0"><na f="t/Thyagarajan:Vidhya" pid="139/9496">Vidhya Thyagarajan</na></co>
<co c="0"><na f="t/Tie:Xiaozheng" pid="62/7890">Xiaozheng Tie</na></co>
<co c="0" n="2"><na f="t/Towsley:Don" pid="t/DonaldFTowsley">Don Towsley</na><na>Donald F. Towsley</na></co>
<co c="0"><na f="v/Valenti:Matthew_C=" pid="90/1227">Matthew C. Valenti</na></co>
<co c="0"><na f="v/Vasudevan:Sudarshan" pid="05/4289">Sudarshan Vasudevan</na></co>
<co c="0"><na f="v/Veen:Alle=Jan_van_der" pid="29/6532">Alle-Jan van der Veen</na></co>
<co c="0"><na f="v/Venkataramani:Arun" pid="v/ArunVenkataramani">Arun Venkataramani</na></co>
<co c="0"><na f="v/Venkatraman:Subramanian" pid="43/6550">Subramanian Venkatraman</na></co>
<co c="-1"><na f="v/Veronesi:Daniele" pid="72/4544">Daniele Veronesi</na></co>
<co c="0"><na f="w/Wagner:Mark" pid="45/5522">Mark Wagner</na></co>
<co c="0"><na f="w/Wang:Liaoruo" pid="44/4357">Liaoruo Wang</na></co>
<co c="0"><na f="w/Wei:Shuangqing" pid="04/1738">Shuangqing Wei</na></co>
<co c="0"><na f="w/Wei_0001:Wei" pid="24/4105-1">Wei Wei 0001</na></co>
<co c="0"><na f="w/Wesel:Richard_D=" pid="51/5171">Richard D. Wesel</na></co>
<co c="0"><na f="w/Westphal:C=eacute=dric" pid="37/800">C&#233;dric Westphal</na></co>
<co c="0"><na f="w/Win:Moe_Z=" pid="21/4583">Moe Z. Win</na></co>
<co c="0"><na f="x/Xia:Xiaohao" pid="318/4598">Xiaohao Xia</na></co>
<co c="0"><na f="x/Xu:Huilin" pid="41/4264">Huilin Xu</na></co>
<co c="0"><na f="x/Xu:Jie" pid="37/5126">Jie Xu</na></co>
<co c="0"><na f="x/Xu:Zhengyuan" pid="62/1262">Zhengyuan Xu</na></co>
<co c="0"><na f="y/Yan:Shihao" pid="19/11269">Shihao Yan</na></co>
<co c="0"><na f="y/Yang_0001:Liuqing" pid="52/6918-1">Liuqing Yang 0001</na></co>
<co c="0"><na f="z/Zafer:Murtaza" pid="36/4655">Murtaza Zafer</na></co>
<co c="0"><na f="z/Zhang:Chun" pid="77/2866">Chun Zhang</na></co>
<co c="0"><na f="z/Zhang:Honglei" pid="40/2812">Honglei Zhang</na></co>
<co c="0"><na f="z/Zhang:Qu" pid="57/5249">Qu Zhang</na></co>
<co c="0"><na f="z/Zhao:Shiwei" pid="12/6839">Shiwei Zhao</na></co>
</coauthors>
</dblpperson>

