Onur Günlü

Orcid: 0000-0002-0313-7788

According to our database1, Onur Günlü authored at least 85 papers between 2014 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Secure Coded Distributed Computing and Extensions to Multiple Access Setting.
IEEE Trans. Commun., November, 2025

Forward-Forward Autoencoder Architectures for Energy-Efficient Wireless Communications.
CoRR, October, 2025

Multi-hop Deep Joint Source-Channel Coding with Deep Hash Distillation for Semantically Aligned Image Retrieval.
CoRR, October, 2025

The Role of ISAC in 6G Networks: Enabling Next-Generation Wireless Systems.
CoRR, October, 2025

Exact Bias of Linear TRNG Correctors - Spectral Approach.
CoRR, September, 2025

Communication-Efficient Distributed Computing Through Combinatorial Multi-Access Models.
CoRR, August, 2025

Secure Best Arm Identification in the Presence of a Copycat.
CoRR, July, 2025

Fundamental Trade-off Between Computation and Communication in Private Coded Distributed Computing.
CoRR, February, 2025

Topologies for Multi-Access Distributed Computing Models.
IEEE Internet Things J., 2025

Feedback Lunch: Deep Feedback Codes for Wiretap Channels.
IACR Cryptol. ePrint Arch., 2025

Secure Protocols for Best Arm Identification Using Secret Sharing Schemes.
IACR Cryptol. ePrint Arch., 2025

Low-Latency Rate-Distortion-Perception Trade-offs Through Randomized Distributed Function Computations.
IACR Cryptol. ePrint Arch., 2025

Randomized Distributed Function Computation (RDFC): Ultra-Efficient Semantic Communication Applications to Privacy.
IACR Cryptol. ePrint Arch., 2025

Secure Rate-Distortion-Perception Trade-Off with Side Information.
IACR Cryptol. ePrint Arch., 2025

Sensing-Assisted Secure Communications over Correlated Rayleigh Fading Channels.
Entropy, 2025

Private Coded Distributed Computing Framework.
Proceedings of the IEEE International Symposium on Information Theory, 2025

Deep Randomized Distributed Function Computation (DeepRDFC): Neural Distributed Channel Simulation.
Proceedings of the IEEE International Symposium on Information Theory, 2025

Secure Rate-Distortion-Perception Trade-off Over Channels: A Randomized Distributed Function Computation (RDFC) Application.
Proceedings of the IEEE International Symposium on Information Theory, 2025

Low-Latency Rate-Distortion-Perception Trade-Off: A Randomized Distributed Function Computation Application.
Proceedings of the Joint European Conference on Networks and Communications & 6G Summit, 2025

2024
Generalized Rainbow Differential Privacy.
J. Priv. Confidentiality, 2024

Secure Integrated Sensing and Communication under Correlated Rayleigh Fading.
IACR Cryptol. ePrint Arch., 2024

Deep Learning-based Codes for Wiretap Fading Channels.
CoRR, 2024

Multi-access Distributed Computing Models from Map-Reduce Arrays.
CoRR, 2024

Randomized Distributed Function Computation with Semantic Communications: Applications to Privacy.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2024

Low-latency Secure Integrated Sensing and Communication with Transmitter Actions.
Proceedings of the 25th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2024

Secure Coded Distributed Computing.
Proceedings of the 25th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2024

Transmitter Actions for Secure Integrated Sensing and Communication.
Proceedings of the IEEE International Symposium on Information Theory, 2024

Multi-access Distributed Computing Models using Map-Reduce Arrays.
Proceedings of the IEEE International Symposium on Information Theory, 2024

Rate-Limited Shuffling for Distributed Computing.
Proceedings of the IEEE International Symposium on Information Theory, 2024

Nonasymptotic Performance Limits of Low-Latency Secure Integrated Sensing and Communication Systems.
Proceedings of the IEEE International Conference on Acoustics, 2024

2023
Quality of Security Guarantees for and with Physical Unclonable Functions and Biometric Secrecy Systems.
Entropy, August, 2023

Information Theoretic Methods for Future Communication Systems.
Entropy, March, 2023

Secure and Private Distributed Source Coding With Private Keys and Decoder Side Information.
IEEE Trans. Inf. Forensics Secur., 2023

Secure Integrated Sensing and Communication.
IEEE J. Sel. Areas Inf. Theory, 2023

Concatenated Classic and Neural (CCN) Codes: ConcatenatedAE.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023

Secure Integrated Sensing and Communication for Binary Input Additive White Gaussian Noise Channels.
Proceedings of the 3rd IEEE International Symposium on Joint Communications & Sensing, 2023

2022
Private Key and Decoder Side Information for Secure and Private Source Coding.
Entropy, December, 2022

Correction: Günlü, O. Function Computation under Privacy, Secrecy, Distortion, and Communication Constraints. Entropy 2022, 24, 110.
Entropy, 2022

Function Computation under Privacy, Secrecy, Distortion, and Communication Constraints.
Entropy, 2022

Secure and Private Source Coding with Private Key and Decoder Side Information.
Proceedings of the IEEE Information Theory Workshop, 2022

Rainbow Differential Privacy.
Proceedings of the IEEE International Symposium on Information Theory, 2022

Secure Joint Communication and Sensing.
Proceedings of the IEEE International Symposium on Information Theory, 2022

Effects of Quantization on Federated Learning with Local Differential Privacy.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Multi-Entity and Multi-Enrollment Key Agreement With Correlated Noise.
IEEE Trans. Inf. Forensics Secur., 2021

Editorial.
IEEE J. Sel. Areas Inf. Theory, 2021

Controllable Key Agreement With Correlated Noise.
IEEE J. Sel. Areas Inf. Theory, 2021

An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications.
IEEE J. Sel. Areas Inf. Theory, 2021

Privacy, Secrecy, and Storage with Nested Randomized Polar Subcode Constructions.
IACR Cryptol. ePrint Arch., 2021

Effects of Quantization on the Multiple-Round Secret-Key Capacity.
IACR Cryptol. ePrint Arch., 2021

Code Constructions and Bounds for Identification via Channels.
IACR Cryptol. ePrint Arch., 2021

Private Remote Sources for Secure Multi-Function Computation.
IACR Cryptol. ePrint Arch., 2021

Key Agreement with Correlated Noise and Multiple Entities or Enrollments.
IACR Cryptol. ePrint Arch., 2021

Key Agreement with Physical Unclonable Functions and Biometric Identifiers.
IACR Cryptol. ePrint Arch., 2021

An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions.
Entropy, 2021

Secure Lossy Function Computation with Multiple Private Remote Source Observations.
Proceedings of the 25th International ITG Workshop on Smart Antennas, 2021

Quality of Service Guarantees for Physical Unclonable Functions.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021

Semantic Security for Indoor THz-Wireless Communication.
Proceedings of the 17th International Symposium on Wireless Communication Systems, 2021

Doubly-Exponential Identification via Channels: Code Constructions and Bounds.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Secure Multi-Function Computation with Private Remote Sources.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Federated Learning with Local Differential Privacy: Trade-Offs Between Privacy, Utility, and Communication.
Proceedings of the IEEE International Conference on Acoustics, 2021

Multiple Noisy Private Remote Source Observations for Secure Function Computation.
Proceedings of the 55th Asilomar Conference on Signals, Systems, and Computers, 2021

2020
Coding for Positive Rate in the Source Model Key Agreement Problem.
IEEE Trans. Inf. Theory, 2020

Secret Key Agreement with Physical Unclonable Functions: An Optimality Summary.
IACR Cryptol. ePrint Arch., 2020

Differential Privacy for Eye Tracking with Temporal Correlations.
IACR Cryptol. ePrint Arch., 2020

Skew Convolutional Codes.
Entropy, 2020

On Skew Convolutional and Trellis Codes.
Proceedings of the IEEE Information Theory Workshop, 2020

Randomized Nested Polar Subcode Constructions for Privacy, Secrecy, and Storage.
Proceedings of the International Symposium on Information Theory and Its Applications, 2020

Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication.
Proceedings of the IEEE International Symposium on Information Theory, 2020

Nested Tailbiting Convolutional Codes for Secrecy, Privacy, and Storage.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020

Low-Complexity and Reliable Transforms for Physical Unclonable Functions.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

2019
Key Agreement with Physical Unclonable Functions and Biometric Identifiers.
PhD thesis, 2019

Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems.
IEEE Trans. Inf. Forensics Secur., 2019

Private Authentication with Physical Identifiers Through Broadcast Channel Measurements.
Proceedings of the 2019 IEEE Information Theory Workshop, 2019

2018
Controllable Identifier Measurements for Private Authentication With Secret Keys.
IEEE Trans. Inf. Forensics Secur., 2018

Privacy, Secrecy, and Storage With Multiple Noisy Measurements of Identifiers.
IEEE Trans. Inf. Forensics Secur., 2018

Secure and Reliable Key Agreement with Physical Unclonable Functions.
IACR Cryptol. ePrint Arch., 2018

On Achieving a Positive Rate in the Source Model Key Agreement Problem.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

2017
Wyner-Ziv Coding for Physical Unclonable Functions and Biometric Secrecy Systems.
CoRR, 2017

Secret-key binding to physical identifiers with reliability guarantees.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Privacy, Secrecy, and Storage with Noisy Identifiers.
CoRR, 2016

Reliable secret-key binding for physical unclonable functions with transform coding.
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016

Private authentication with controllable measurement.
Proceedings of the 50th Asilomar Conference on Signals, Systems and Computers, 2016

2015
Reliable secret key generation from physical unclonable functions under varying environmental conditions.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Privacy and secrecy with multiple measurements of physical and biometric identifiers.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
DCT based ring oscillator Physical Unclonable Functions.
Proceedings of the IEEE International Conference on Acoustics, 2014


  Loading...