Eric Graves

Orcid: 0000-0002-4453-9134

Affiliations:
  • US Army Research Laboratory, Adelphi, MD, USA
  • University of Florida, Gainesville, FL, USA (PhD 2013)


According to our database1, Eric Graves authored at least 36 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Estimating Traffic Rates in CSMA/CA Networks: A Feasibility Analysis for a Class of Eavesdroppers.
IEEE Trans. Wirel. Commun., December, 2023

Keyless Authentication for AWGN Channels.
IEEE Trans. Inf. Theory, 2023

Unsupervised Wireless Diarization: A Potential New Attack on Encrypted Wireless Networks.
Proceedings of the IEEE International Conference on Communications, 2023

2022
Secret Key-Enabled Authenticated-Capacity Region, Part I: Average Authentication.
IEEE Trans. Inf. Theory, 2022

Secret Key-Enabled Authenticated-Capacity Region, Part - II: Typical-Authentication.
IEEE Trans. Inf. Theory, 2022

Adaptive Monitoring for Analytics Placement in Tactical Networks.
Proceedings of the IEEE Military Communications Conference, 2022

2021
Minimax Bounds for Blind Network Inference.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Estimating Link Packet Rates From Partial CSMA/CA Network Observations.
Proceedings of the 55th Asilomar Conference on Signals, Systems, and Computers, 2021

2020
Inducing Information Stability to Obtain Information Theoretic Necessary Requirements.
IEEE Trans. Inf. Theory, 2020

Secret key authentication capacity region, Part I: average authentication rate.
CoRR, 2020

Secret key authentication capacity region, Part II: typical authentication rate.
CoRR, 2020

Authentication with Mildly Myopic Adversaries.
Proceedings of the IEEE International Symposium on Information Theory, 2020

Authentication and Partial Message Correction over Adversarial Multiple-Access Channels.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Modular design to transform codes for the wiretap channel of type I into codes for the wiretap channel of type II.
CoRR, 2019

Identifying Bottleneck Nodes using Packet Delay Statistics.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Transforming an arbitrary code for the wiretap channel of type I into a code for the wiretap channel of type II.
Proceedings of the 2019 IEEE Information Theory Workshop, 2019

An information theoretic model for summarization, and some basic results.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Structured Coding for Authentication in the Presence of a Malicious Adversary.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Authentication Against a Myopic Adversary.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
Inducing information stability and applications thereof to obtaining information theoretic necessary conditions directly from operational requirements.
CoRR, 2018

Inner Bound for the Capacity Region of Noisy Channels with an Authentication Requirement.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Transmitting Arbitrary Sources with Finite Error Over a Broadcast Channel with Confidential Communications.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

2017
Wiretap channel capacity: Secrecy criteria, strong converse, and phase change.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Messages per secret bit when authentication and a min-entropy secrecy criterion are required.
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017

Communications over a state dependent channel, when the channel state and message are dependent.
Proceedings of the 55th Annual Allerton Conference on Communication, 2017

2016
Keyless authentication in the presence of a simultaneously transmitting adversary.
Proceedings of the 2016 IEEE Information Theory Workshop, 2016

Information stabilization of images over discrete memoryless channels.
Proceedings of the IEEE International Symposium on Information Theory, 2016

2015
Equal-image-size source partitioning: Creating strong Fano's inequalities for multi-terminal discrete memoryless channels.
CoRR, 2015

Information integrity between correlated sources through Wyner-Ziv coding.
Proceedings of the 2015 IEEE Information Theory Workshop, 2015

2014
Equating the achievable exponent region to the achievable entropy region by partitioning the source.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Information integrity in lossy source coding with side information.
Proceedings of the 52nd Annual Allerton Conference on Communication, 2014

2013
A coding approach to guarantee information integrity against a Byzantine relay.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Detecting substitution attacks against non-colluding relays.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Detectability of Symbol Manipulation by an Amplify-and-Forward Relay
CoRR, 2012

Certification codes for maliciousness detection in Physical-layer Network Coding.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Detection of channel degradation attack by Intermediary Node in Linear Networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012


  Loading...