# Gregory A. Kabatiansky

According to our database

Collaborative distances:

^{1}, Gregory A. Kabatiansky authored at least 66 papers between 1993 and 2023.Collaborative distances:

## Timeline

#### Legend:

Book In proceedings Article PhD thesis Dataset Other## Links

#### On csauthors.net:

## Bibliography

2023

A constructive approach to multimedia codes with complete traceability resistant to δ-noise.

Proceedings of the IEEE Information Theory Workshop, 2023

Multimedia Fingerprinting Codes Resistant to Linear Attacks and Adversarial Noise.

Proceedings of the International Symposium on Networks, Computers and Communications, 2023

2021

Probl. Inf. Transm., 2021

2020

Existence and Construction of Complete Traceability Multimedia Fingerprinting Codes Resistant to Averaging Attack and Adversarial Noise.

Probl. Inf. Transm., 2020

Des. Codes Cryptogr., 2020

Adversarial multiple access channels and a new model of multimedia fingerprinting coding.

Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

Proceedings of the Code-Based Cryptography - 8th International Workshop, 2020

2019

IEEE Trans. Inf. Theory, 2019

Probl. Inf. Transm., 2019

Signature codes for weighted noisy adder channel, multimedia fingerprinting and compressed sensing.

Des. Codes Cryptogr., 2019

Proceedings of the IEEE International Symposium on Information Theory, 2019

On the Tracing Traitors Math - Dedicated to the Memory of Bob Blakley - Pioneer of Digital Fingerprinting and Inventor of Secret Sharing.

Proceedings of the Codes, Cryptology and Information Security, 2019

2018

Probl. Inf. Transm., 2018

Constructions of almost secure frameproof codes with applications to fingerprinting schemes.

Des. Codes Cryptogr., 2018

2017

Electron. Notes Discret. Math., 2017

Des. Codes Cryptogr., 2017

Proceedings of the Coding Theory and Applications - 5th International Castle Meeting, 2017

2016

Des. Codes Cryptogr., 2016

Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

Signature codes for the A-channel and collusion-secure multimedia fingerprinting codes.

Proceedings of the IEEE International Symposium on Information Theory, 2016

2015

Probl. Inf. Transm., 2015

Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Proceedings of the IEEE International Symposium on Information Theory, 2015

Proceedings of the Cryptography and Coding - 15th IMA International Conference, 2015

2013

IEEE Trans. Inf. Theory, 2013

Constructions of Almost Secure Frameproof Codes Based on Small-Bias Probability Spaces.

Proceedings of the Advances in Information and Computer Security, 2013

2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Digital Fingerprinting under and (Somewhat) beyond the Marking Assumption - (Invited Talk).

Proceedings of the Information Theoretic Security - 5th International Conference, 2011

2010

Proceedings of the 2010 IEEE Information Theory Workshop, 2010

2009

Probl. Inf. Transm., 2009

CoRR, 2009

2008

List Decoding of Biorthogonal Codes and the Hadamard Transform With Linear Complexity.

IEEE Trans. Inf. Theory, 2008

2007

Probl. Inf. Transm., 2007

Soft-Decision List Decoding with Linear Complexity for the First-Order Reed-Muller Codes.

Proceedings of the IEEE International Symposium on Information Theory, 2007

2006

List decoding of Reed-Muller codes up to the Johnson bound with almost linear complexity.

Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

2005

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Probl. Inf. Transm., 2005

2004

Proceedings of the Handbook of Discrete and Computational Geometry, Second Edition., 2004

J. Complex., 2004

Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

Random coding technique for digital fingerprinting codes: fighting two pirates revisited.

Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

2003

Digital fingerprinting codes: problem statements, constructions, identification of traitors.

IEEE Trans. Inf. Theory, 2003

Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003

2001

Probl. Inf. Transm., 2001

A hypergraph approach to the identifying parent property: the case of multiple parents.

Electron. Notes Discret. Math., 2001

1997

Proceedings of the Cryptography and Coding, 1997

1996

IEEE Trans. Inf. Theory, 1996

Proceedings of the Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996, 1996

1995

Proceedings of the Advances in Cryptology, 1995

1993

Proceedings of the Algebraic Coding, 1993

Proceedings of the Advances in Cryptology, 1993

Proceedings of the Error Control, Cryptology, and Speech Compression, 1993

Proceedings of the Advances in Cryptology, 1993