A. J. Han Vinck

According to our database1, A. J. Han Vinck authored at least 145 papers between 1975 and 2021.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2005, "For contributions to coding techniques.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Novel low complexity decoding method for the binary coded frequency shift keying modulation.
Concurr. Comput. Pract. Exp., 2021

2020
Analysis of Clipping a Digital Modulated Signal Affected by AWGN and Impulse Noise.
Proceedings of the 12th International Symposium on Communication Systems, 2020

2019
Secrecy over Multiple-Access Channel: A Game of Competition and Cooperation.
J. Univers. Comput. Sci., 2019

Proceedings of the 11th Asia-Europe Workshop on Concepts in Information Theory.
CoRR, 2019

Reliability Analysis of Centralized Radio Access Networks in Non-Line-of-Sight and Line-of-Sight Scenarios.
IEEE Access, 2019

An Information-Theoretic Approach to the Chipless RFID Tag Identification.
IEEE Access, 2019

Short Block Code Concatenated with a Permutation Code for Narrowband PLC Communication Systems.
Proceedings of the 2nd IEEE Middle East and North Africa COMMunications Conference, 2019

Coding for Write ℓ-step-up Memories.
Proceedings of the IEEE International Symposium on Information Theory, 2019

2018
Anticollision Algorithms for FM0 Code and Miller Subcarrier Sequence in RFID Applications.
IEEE Trans. Veh. Technol., 2018

Massive MIMO Antenna Selection: Switching Architectures, Capacity Bounds, and Optimal Antenna Selection Algorithms.
IEEE Trans. Signal Process., 2018

Collective Secrecy Over the K-Transmitter Multiple Access Channel.
IEEE Trans. Inf. Forensics Secur., 2018

Systematic [n, n - 2] codes with capability of correcting single- and adjacent transposition errors.
Proceedings of the IEEE Information Theory Workshop, 2018

Waveform clipping in FSK modulated signal to combat impulse noise.
Proceedings of the IEEE International Symposium on Power Line Communications and its Applications, 2018

Channel frequency response for a low voltage indoor cable up to 1GHz.
Proceedings of the IEEE International Symposium on Power Line Communications and its Applications, 2018

Some classes of systematic polynomial codes correcting single- and adjacent transposition errors.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Coded Quaternary FSK and SFSK Performances Under the Narrow-Band PLC Channel Constraints.
Proceedings of the International Conference on Internet of Things, 2018

2017
PSK to CSK mapping for hybrid systems involving the radio frequency and the visible spectrum.
Telecommun. Syst., 2017

A Spectral Compressive Resource Allocation Technique for PLC Systems.
IEEE Trans. Commun., 2017

Relay selection in cooperative power line communication: A multi-armed bandit approach.
J. Commun. Networks, 2017

Statistical analysis and modeling of a novel parameter for resource allocation in multicarrier PLC systems.
Trans. Emerg. Telecommun. Technol., 2017

On the Binary Input Gaussian Wiretap Channel with/without Output Quantization.
Entropy, 2017

Effects of Feedback on the One-sided Secrecy of Two-way Wiretap through Multiple Transmissions.
CoRR, 2017

Proceedings of Workshop AEW10: Concepts in Information Theory and Communications.
CoRR, 2017

An overview of colour LED & CFL lighting interference on the low voltage PLC network.
Proceedings of the 40th International Conference on Telecommunications and Signal Processing, 2017

Influence of LED tubes on the throughput of an indoor broadband PLC channel.
Proceedings of the 40th International Conference on Telecommunications and Signal Processing, 2017

Joint secrecy over the K-transmitter multiple access channel.
Proceedings of the 2017 IEEE Information Theory Workshop, 2017

Impedance analysis of a power line distribution network using short-time Fourier Transform.
Proceedings of the IEEE International Symposium on Power Line Communications and its Applications, 2017

Statistical characterization and modelling of impulse noise on indoor narrowband PLC environment.
Proceedings of the IEEE International Symposium on Power Line Communications and its Applications, 2017

A simplistic channel model for cascaded PLC-VLC systems.
Proceedings of the IEEE International Symposium on Power Line Communications and its Applications, 2017

An adaptive pursuit strategy for dynamic spectrum assignment in narrowband PLC.
Proceedings of the IEEE International Symposium on Power Line Communications and its Applications, 2017

2016
A Robust Opportunistic Relaying Strategy for Co-Operative Wireless Communications.
IEEE Trans. Wirel. Commun., 2016

4-Ary Codebook Design Using Reed-Muller Codes for MIMO Beamforming Systems.
IEEE Trans. Veh. Technol., 2016

Application of symbol avoidance in Reed-Solomon codes to improve their synchronization.
Telecommun. Syst., 2016

A general check digit system based on finite groups.
Des. Codes Cryptogr., 2016

Narrow-band interference error correction in coded OFDM-based PLC systems.
Proceedings of the International Symposium on Power Line Communications and its Applications, 2016

Resource allocation in OFDM-based PLC systems impaired by additive impulsive Gaussian noise.
Proceedings of the International Symposium on Power Line Communications and its Applications, 2016

Contactless Power Line Communications at 2.45GHz.
Proceedings of the International Symposium on Power Line Communications and its Applications, 2016

One-sided secrecy over the two-way wiretap channel.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

Secrecy coding for the binary multiplying wiretap channel.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

On secure communication over the multiple access channel.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

2015
Capacity-equivocation region of a special case of wiretap channel with noiseless feedback.
J. Commun. Networks, 2015

Secure error-correcting network codes with side information leakage.
IET Commun., 2015

Impulse Noise and Narrowband PLC.
CoRR, 2015

Multi-armed bandit channel selection for power line communication.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

Noise generated by modern lamps and the influence on the smart-grid communication network.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

The effects of periodic impulsive noise on OFDM.
Proceedings of the IEEE International Symposium on Power Line Communications and Its Applications, 2015

A preliminary investigation of the UHF properties of LV cable for WiFi over power line communications.
Proceedings of the IEEE International Symposium on Power Line Communications and Its Applications, 2015

The influence of high pressure sodium lamps on the power line communications channel.
Proceedings of the IEEE International Symposium on Power Line Communications and Its Applications, 2015

Cascaded PLC-VLC Channel Using OFDM and CSK Techniques.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

On mercury vapor lamps and their effect on the smart-grid plc channel.
Proceedings of the IEEE International Workshop on Applied Measurements for Power Systems, 2015

Segmental analysis of the transmission in CSK systems based on the Euclidean distance.
Proceedings of the AFRICON 2015, Addis Ababa, Ethiopia, September 14-17, 2015, 2015

2014
On the Error Detection Capability of One Check Digit.
IEEE Trans. Inf. Theory, 2014

A Construction of Long-Period Sequences Based on Lightweight Generation and High Probability.
IEEE Trans. Commun., 2014

Efficient Codes for Writing Equal-bit Information in a WOM Twice.
J. Multim., 2014

On the relative profiles of a linear code and a subcode.
Des. Codes Cryptogr., 2014

Correlated Source Coded Sequences with Compromised Channel and Source Symbols using Shannon's Cipher System.
CoRR, 2014

Gaussian fuzzy commitment.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

Binary transmissions over Gaussian wiretap channel under soft/hard decision decoding.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

Measurement of buffer requirement trends for real time traffic over TCP.
Proceedings of the IEEE 15th International Conference on High Performance Switching and Routing, 2014

Information leakage for correlated sources with compromised source symbols over wiretap channel II.
Proceedings of the 52nd Annual Allerton Conference on Communication, 2014

2013
Robust Decoding for Convolutionally Coded Systems Impaired by Memoryless Impulsive Noise.
IEEE Trans. Commun., 2013

Wiretap Channel in the Presence of Action-Dependent States and Noiseless Feedback.
J. Appl. Math., 2013

Capacity Region of a New Bus Communication Model.
Entropy, 2013

Wiretap Channel with Action-Dependent Channel State Information.
Entropy, 2013

System level evaluation of cooperative MIMO-OFDMA-based heterogeneous networks.
Proceedings of the IEEE International Conference on Communications, 2013

2012
Robust Clipping for OFDM Transmissions over Memoryless Impulsive Noise Channels.
IEEE Commun. Lett., 2012

Information-Theoretical Security for Several Models of Multiple-Access Channel
CoRR, 2012

Estimation of the entropy on the basis of its polynomial representation.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Capacity region of non-degraded wiretap channel with noiseless feedback.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Degraded broadcast channel with noncausal side information, confidential messages and noiseless feedback.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

On some properties of a check digit system.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Authentication over noisy data with the use of memory containing metric functions.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

2011
Secrecy coding for the binary symmetric wiretap channel.
Secur. Commun. Networks, 2011

Performance of the verification for binary memoryless channels.
Secur. Commun. Networks, 2011

Coded Modulation for Power Line Communications
CoRR, 2011

A Fresh Look into the Biometric Authentication - Perspective from Shannon's Secrecy System and a Special Wiretap Channel.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Applications of coding and information theory in biometrics.
Proceedings of the 19th European Signal Processing Conference, 2011

Biometric Authentication Based on Significant Parameters.
Proceedings of the Biometrics and ID Management, 2011

2010
Constructing Coset Codes With Optimal Same-Symbol Weight for Detecting Narrowband Interference in M-FSK Systems.
IEEE Trans. Inf. Theory, 2010

On the optimum distance profiles about linear block codes.
IEEE Trans. Inf. Theory, 2010

A lower bound on the optimum distance profiles of the second-order Reed-Muller codes.
IEEE Trans. Inf. Theory, 2010

Soft Decoding of Integer Codes and Their Application to Coded Modulation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

A Simple Scheme for Constructing Fault-Tolerant Passwords from Biometric Data.
EURASIP J. Inf. Secur., 2010

Direct biometric verification schemes with Gaussian data.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

2009
Mathematical model for constructing passwords from biometrical data.
Secur. Commun. Networks, 2009

Notes on Reed-Muller Codes
CoRR, 2009

Coded modulation with a constraint on the minimum channel symbol duration.
Proceedings of the IEEE International Symposium on Information Theory, 2009

The optimum distance profiles of the second order Reed-Muller codes.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Combinatorial data reduction algorithm and its applications to biometric verification.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Constructing Passwords from Biometrical Data.
Proceedings of the Advances in Biometrics, Third International Conference, 2009

2008
Coding Schemes for Crisscross Error Patterns.
Wirel. Pers. Commun., 2008

Wiretap Channel With Side Information.
IEEE Trans. Inf. Theory, 2008

Some Upper Bounds on the Inverse Relative Dimension/Length Profile.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

A Cryptographic Biometric Authentication System based on Genetic Fingerprints.
Proceedings of the Sicherheit 2008: Sicherheit, 2008

Wiretap Channel with Side Information from Part of Encoder.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

Optimum distance profiles of linear block codes.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Additive Block Coding Schemes for Biometric Authentication with the DNA Data.
Proceedings of the Biometrics and Identity Management, First European Workshop, 2008

2007
An algebraic approach to generate super-set of perfect complementary codes for interference-free CDMA.
Wirel. Commun. Mob. Comput., 2007

A New Collision Arbitration Algorithm for FM0 Code in RFID Applications.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

On Optical Orthogonal, Cyclically Permutable, and Super Optical Orthogonal Codes.
Proceedings of the IEEE International Symposium on Information Theory, 2007

An Achievable Region of Gaussian Wiretap Channel with Side Information.
Proceedings of the IEEE International Symposium on Information Theory, 2007

Testing the Independence of Two Non-Stationary Random Processes with Applications to Biometric Authentication.
Proceedings of the IEEE International Symposium on Information Theory, 2007

An Algorithm for Biometric Authentication Based on the Model of Non-Stationary Random Processes.
Proceedings of the Advances in Biometrics, International Conference, 2007

2006
An achievable region for the Gaussian wiretap channel with side information.
IEEE Trans. Inf. Theory, 2006

Generalized pairwise complementary codes with set-wise uniform interference-free windows.
IEEE J. Sel. Areas Commun., 2006

Error Exponent in AVS Coding.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Coding Schemes for Data Transmission over Bus Systems.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

2005
Some new characters on the wire-tap channel of type II.
IEEE Trans. Inf. Theory, 2005

Permutation trellis codes.
IEEE Trans. Commun., 2005

2004
Coding and signal space diversity for a class of fading and impulsive noise channels.
IEEE Trans. Inf. Theory, 2004

On the capacity of write-unidirectional memories with nonperiodic codes.
IEEE Trans. Inf. Theory, 2004

Achieving the perfect secrecy for the Gaussian wiretap channel with side information.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

A generalization of MDS codes.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

Achievable rates and decoding error probability for parallel channels with dependent noise and restricted number of active users.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

Capacity of BPSK signaling in fading channels with generalized selection combining.
Proceedings of IEEE International Conference on Communications, 2004

2003
On constant-composition codes over Z<sub>q</sub>.
IEEE Trans. Inf. Theory, 2003

Iterative decoding of codes over complex numbers for impulsive noise channels.
IEEE Trans. Inf. Theory, 2003

The Determination of the Chain Good Weight Hierarchies with High Dimension.
SIAM J. Discret. Math., 2003

On the Performance of Permutation Codes for Multi-User Communication.
Probl. Inf. Transm., 2003

Powerline communications and applications.
Int. J. Commun. Syst., 2003

Power line communications: state of the art and future trends.
IEEE Commun. Mag., 2003

2002
DC-free binary convolutional coding.
IEEE Trans. Inf. Theory, 2002

Performance bounds for optimum and suboptimum reception under Class-A impulsive noise.
IEEE Trans. Commun., 2002

2001
Correction to "A decoding algorithm with restrictions for array codes".
IEEE Trans. Inf. Theory, 2001

Constructions of specific permutation codes for multi-user communication.
Proceedings of the 2001 IEEE Information Theory Workshop, 2001

1999
A decoding algorithm with restrictions for array codes.
IEEE Trans. Inf. Theory, 1999

On the Capacity of Generalized Write-Once Memory with State Transitions Described by an Arbitrary Directed Acyclic Graph.
IEEE Trans. Inf. Theory, 1999

1998
Convolutional Encoder State Estimation.
IEEE Trans. Inf. Theory, 1998

On the Constructions of Constant-Weight Codes.
IEEE Trans. Inf. Theory, 1998

1997
Insertion/deletion correction with spectral nulls.
IEEE Trans. Inf. Theory, 1997

1996
On the capacity of the asynchronous T-user M-frequency noiseless multiple-access channel without intensity information.
IEEE Trans. Inf. Theory, 1996

An algorithm for identifying rate (n-1)/n catastrophic punctured convolutional encoders.
IEEE Trans. Inf. Theory, 1996

On the construction of maximal prefix-synchronized codes.
IEEE Trans. Inf. Theory, 1996

On the undetected error probability of linear block codes on channels with memory.
IEEE Trans. Inf. Theory, 1996

1994
On the general defective channel with informed encoder and capacities of some constrained memories.
IEEE Trans. Inf. Theory, 1994

1993
Perfect (d, k)-codes capable of correcting single peak-shifts.
IEEE Trans. Inf. Theory, 1993

A coding scheme for single peak-shift correction in (d, k)-constrained channels.
IEEE Trans. Inf. Theory, 1993

1991
A convolutional single-parity-check concatenated coding scheme for high-data-rate applications.
IEEE Trans. Commun., 1991

1989
On the influence of coding on the mean time to failure for degrading memories with defects.
IEEE Trans. Inf. Theory, 1989

1987
On coding for 'stuck-at' defects.
IEEE Trans. Inf. Theory, 1987

1985
On the capacity of the two-user M -ary multiple-access channel with feedback.
IEEE Trans. Inf. Theory, 1985

1984
A Low Complexity Stack Decoder for a Class of Binary Rate (n-1)/n Convolutional Codes.
IEEE Trans. Commun., 1984

1980
A class of binary rate one-half convolutional codes that allows an improved stack decoder.
IEEE Trans. Inf. Theory, 1980

1978
Syndrome decoding of binary-rate k/n convolutional codes.
IEEE Trans. Inf. Theory, 1978

1975
Syndrome Decoding of Convolutional Codes.
IEEE Trans. Commun., 1975


  Loading...