Frans M. J. Willems

According to our database1, Frans M. J. Willems authored at least 100 papers between 1982 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
Enumerative Sphere Shaping for Wireless Communications With Short Packets.
IEEE Trans. Wirel. Commun., 2020

On the Downlink Capacity of Cell-Free Massive MIMO with Constrained Fronthaul Capacity.
Entropy, 2020

Probabilistic Shaping for Finite Blocklengths: Distribution Matching and Sphere Shaping.
Entropy, 2020

Achievable Information Rates for Probabilistic Amplitude Shaping: An Alternative Approach via Random Sign-Coding Arguments.
Entropy, 2020

Achievable Information Rates for Probabilistic Amplitude Shaping: A Minimum-Randomness Approach via Random Sign-Coding Arguments.
CoRR, 2020

Modeling Temperature Behavior in the Helper Data for Secret-Key Binding with SRAM PUFs.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

RESCURE: a security solution for IoT life cycle.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Secret-Key Capacity Regions for Multiple Enrollments With an SRAM-PUF.
IEEE Trans. Inf. Forensics Secur., 2019

Secret Key Generation Over Biased Physical Unclonable Functions With Polar Codes.
IEEE Internet Things J., 2019

An Improved Dropping Algorithm for Line-of-Sight Massive MIMO With Tomlinson-Harashima Precoding.
IEEE Commun. Lett., 2019

An Improved Dropping Algorithm for Line-of-Sight Massive MIMO With Max-Min Power Control.
IEEE Commun. Lett., 2019

Enumerative Sphere Shaping for Rate Adaptation and Reach Increase in WDM Transmission Systems.
CoRR, 2019

Introducing Enumerative Sphere Shaping for Optical Communication Systems with Short Blocklengths.
CoRR, 2019

Debiasing of SRAM PUFs: Selection and Balancing.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019

Partial Enumerative Sphere Shaping.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

First Experimental Demonstration of Probabilistic Enumerative Sphere Shaping in Optical Fiber Communications.
Proceedings of the 2019 24th OptoElectronics and Communications Conference (OECC) and 2019 International Conference on Photonics in Switching and Computing (PSC), 2019

2018
Capacity of a Multiple Enrollment System Based on an SRAM-PUF: Forgetful Setting.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Approximate Enumerative Sphere Shaping.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

A Reduced-Complexity Linear Precoding Strategy for Massive MIMO Base Stations.
Proceedings of the 25th International Conference on Telecommunications, 2018

2017
Two-Way Visible Light Communication and Illumination With LEDs.
IEEE Trans. Commun., 2017

Achievable Information Rates for Fiber Optics: Applications and Computations.
CoRR, 2017

High-Rate Error Correction Schemes for SRAM-PUFs based on Polar Codes.
CoRR, 2017

Constellation shaping for IEEE 802.11.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

Security of helper data schemes for SRAM-PUF in multiple enrollment scenarios.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

A Robust SRAM-PUF Key Generation Scheme Based on Polar Codes.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Identification Rate, Search and Memory Complexity Tradeoff: Fundamental Limits.
IEEE Trans. Inf. Theory, 2016

Secure key generation from biased PUFs: extended version.
J. Cryptogr. Eng., 2016

Redundant run-length limited encoding for two-way visible light communication.
Proceedings of the IECON 2016, 2016

2015
Fundamental Limits for Privacy-Preserving Biometric Identification Systems That Support Authentication.
IEEE Trans. Inf. Theory, 2015

Secure Key Generation from Biased PUFs.
IACR Cryptol. ePrint Arch., 2015

Capacity investigation of on-off keying in noncoherent channel settings at low SNR.
Trans. Emerg. Telecommun. Technol., 2015

Complexity reduction for non-coherent iteratively detected differentially encoded quaternary phase shift keying based on trellis decomposition.
Trans. Emerg. Telecommun. Technol., 2015

Information-theoretical limits of active content fingerprinting in content-based identification systems.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Joint illumination and visible-Light Communication systems: Data rates and extra power consumption.
Proceedings of the IEEE International Conference on Communication, 2015

2014
Information Theoretical Analysis of Identification based on Active Content Fingerprinting.
CoRR, 2014

An illumination perspective on visible light communications.
IEEE Commun. Mag., 2014

Capacity study of distributed beamforming in relation to constrained backbone communication.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

Light sensor calibration and dimming sequence design in distributed lighting control systems.
Proceedings of 11th IEEE International Conference on Networking, Sensing and Control, 2014

Privacy-leakage codes for biometric authentication systems.
Proceedings of the IEEE International Conference on Acoustics, 2014

Optimum diversity combining techniques for visible light communication systems.
Proceedings of the 2014 IEEE GLOBECOM Workshops, Austin, TX, USA, December 8-12, 2014, 2014

Illumination gain estimation and tracking in a distributed lighting control system.
Proceedings of the 2014 IEEE Conference on Control Applications, 2014

2013
Wagner-like decoding for noncoherent PPM based ultra-low-power communications.
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013

Performance study of BCJR decoding based hybrid ARQ for autonomous wireless bans.
Proceedings of the 7th International Symposium on Medical Information and Communication Technology, 2013

Square Root approximation to the Poisson Channel.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Fundamental limits of identification: Identification rate, search and memory complexity trade-off.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Detection performance analysis of an ultrasonic presence sensor.
Proceedings of the IEEE International Conference on Acoustics, 2013

Privacy Leakage in Binary Biometric Systems: From Gaussian to Binary Data.
Proceedings of the Security and Privacy in Biometrics, 2013

2012
Two-Dimensional Iterative Processing for DAB Receivers Based on Trellis-Decomposition.
J. Electr. Comput. Eng., 2012

Biometric Security from an Information-Theoretical Perspective.
Found. Trends Commun. Inf. Theory, 2012

The optical illumination channel.
Proceedings of the 19th IEEE Symposium on Communications and Vehicular Technology in the Benelux, 2012

Authentication based on secret-key generation.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

PPM-based relay communication schemes for wireless body area networks.
Proceedings of the International Symposium on Communications and Information Technologies, 2012

2011
A-Posteriori Symbol Probabilities and Log-Likelihood Ratios for Coherently Detected frac{π}{4}-DE-QPSK.
IEEE Commun. Lett., 2011

Investigations of noncoherent OOK based schemes with soft and hard decisions for WSNs.
Proceedings of the 49th Annual Allerton Conference on Communication, 2011

2010
Information leakage in fuzzy commitment schemes.
IEEE Trans. Inf. Forensics Secur., 2010

Identification and secret-key binding in binary-symmetric template-protected biometric systems.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

Identification and secret-key generation in biometric systems with protected templates.
Proceedings of the Multimedia and Security Workshop, 2010

On information leakage in fuzzy commitment.
Proceedings of the Media Forensics and Security II, 2010

Fundamental limits for biometric identification with a database containing protected templates.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

Joint and iterative detection and decoding of differentially encoded COFDM systems.
Proceedings of the 17th International Conference on Telecommunications, 2010

2009
Bit-interleaved coded modulation revisited: a mismatched decoding perspective.
IEEE Trans. Inf. Theory, 2009

Biometric systems: privacy and secrecy aspects.
IEEE Trans. Inf. Forensics Secur., 2009

Searching methods for biometric identification systems: Fundamental limits.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Secret rate - Privacy leakage in biometric systems.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Achieving Secure Fuzzy Commitment Scheme for Optical PUFs.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2008
Pilot-Aided Angle-Domain Channel Estimation Techniques for MIMO-OFDM Systems.
IEEE Trans. Veh. Technol., 2008

Signaling Over Arbitrarily Permuted Parallel Channels.
IEEE Trans. Inf. Theory, 2008

Bit-Interleaved Coded Modulation in the Wideband Regime.
IEEE Trans. Inf. Theory, 2008

Semantic coding: Partial transmission.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Rotated and scaled alamouti coding.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Low-complexity sequential probability estimation and universal compression for binary sequences with constrained distributions.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

2007
Low-Complexity LMMSE-Based MIMO-OFDM Channel Estimation Via Angle-Domain Processing.
IEEE Trans. Signal Process., 2007

On Privacy in Secure Biometric Authentication Systems.
Proceedings of the IEEE International Conference on Acoustics, 2007

2006
Estimating the Secrecy-Rate of Physical Unclonable Functions with the Context-Tree Weighting Method.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

2005
Capacity and codes for embedding information in gray-scale signals.
IEEE Trans. Inf. Theory, 2005

Applying Erez and Ten Brink's dirty paper codes to data hiding.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Semantic compaction, transmission, and compression codes.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

2004
Optimal Universal Coding with Respect to the Maximal Individual Relative Redundancy Criterion.
Probl. Inf. Transm., 2004

Blahut-Arimoto algorithms for computing channel capacity and rate-distortion with side information.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

2003
Capacity bounds and constructions for reversible data-hiding.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

Coding Theorems for Reversible Embedding.
Proceedings of the Advances in Network Information Theory, 2003

2002
Communicating via a processing broadcast satellite.
IEEE Trans. Inf. Theory, 2002

2000
Variable-to-Fixed Length Codes: A Geometrical Approach to Low-Complexity Source Codes.
Proceedings of the Data Compression Conference, 2000

1998
The Context-Tree Weighting Method : Extensions.
IEEE Trans. Inf. Theory, 1998

Switching Between Two Universal Source Coding Algorithms.
Proceedings of the Data Compression Conference, 1998

1996
Context weighting for general finite-context sources.
IEEE Trans. Inf. Theory, 1996

Coding for a binary independent piecewise-identically-distributed source.
IEEE Trans. Inf. Theory, 1996

1995
The context-tree weighting method: basic properties.
IEEE Trans. Inf. Theory, 1995

1994
On the performance of data receivers with a restricted detection delay.
IEEE Trans. Commun., 1994

1993
Review of 'Elements of Information Theory' (Cover, T.M., and Thomas, J.A.; 1991).
IEEE Trans. Inf. Theory, 1993

1992
A universal variable-to-fixed length source code based on Lawrence's algorithm.
IEEE Trans. Inf. Theory, 1992

1989
Universal data compression and repetition times.
IEEE Trans. Inf. Theory, 1989

Dependence balance bounds for single-output two-way channels.
IEEE Trans. Inf. Theory, 1989

1988
Totally asynchronous Slepian-Wolf data compression.
IEEE Trans. Inf. Theory, 1988

1987
Variable to fixed-length codes for Markov sources.
IEEE Trans. Inf. Theory, 1987

1985
The discrete memoryless multiple-access channel with cribbing encoders.
IEEE Trans. Inf. Theory, 1985

1984
On multiple access channels with feedback.
IEEE Trans. Inf. Theory, 1984

1983
Partial feedback for the discrete memoryless multiple access channel.
IEEE Trans. Inf. Theory, 1983

The discrete memoryless multiple access channel with partially cooperating encoders.
IEEE Trans. Inf. Theory, 1983

1982
The feedback capacity region of a class of discrete memoryless multiple access channels.
IEEE Trans. Inf. Theory, 1982


  Loading...