Ravi Tandon

According to our database1, Ravi Tandon authored at least 157 papers between 2008 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Deep Learning for SVD and Hybrid Beamforming.
IEEE Trans. Wirel. Commun., 2020

Blind MIMO Cooperative Jamming: Secrecy via ISI Heterogeneity Without CSIT.
IEEE Trans. Inf. Forensics Secur., 2020

Designing Finite Alphabet Iterative Decoders of LDPC Codes Via Recurrent Quantized Neural Networks.
IEEE Trans. Commun., 2020

Adversarial Filters for Secure Modulation Classification.
CoRR, 2020

Asymmetric Leaky Private Information Retrieval.
CoRR, 2020

Wireless Federated Learning with Local Differential Privacy.
CoRR, 2020

Communication Efficient Federated Learning over Multiple Access Channels.
CoRR, 2020

Local Information Privacy and Its Application to Privacy-Preserving Data Aggregation.
CoRR, 2020

Aggregation-based location privacy: An information theoretic approach.
Comput. Secur., 2020

Wireless Federated Learning with Local Differential Privacy.
Proceedings of the IEEE International Symposium on Information Theory, 2020

Latent-variable Private Information Retrieval.
Proceedings of the IEEE International Symposium on Information Theory, 2020

Regret Analysis of Stochastic Multi-armed Bandit Problem with Clustered Information Feedback.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Unsupervised mmWave Beamforming via Autoencoders.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

On Secure Topological Interference Management for Half-rate-feasible Networks.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
Near Optimal Coded Data Shuffling for Distributed Learning.
IEEE Trans. Inf. Theory, 2019

Online Location Trace Privacy: An Information Theoretic Approach.
IEEE Trans. Inf. Forensics Secur., 2019

Secure Retrospective Interference Alignment.
Entropy, 2019

Context Aware Laplacian Mechanism for Local Information Privacy.
Proceedings of the 2019 IEEE Information Theory Workshop, 2019

On the Upload versus Download Cost for Secure and Private Matrix Multiplication.
Proceedings of the 2019 IEEE Information Theory Workshop, 2019

On the Capacity of Leaky Private Information Retrieval.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Interference Channels with Confidential Messages: Leveraging OFDM Transmission to Scale up Secure Degrees of Freedom with No CSIT.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Local Information Privacy with Bounded Prior.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Random Sampling for Distributed Coded Matrix Multiplication.
Proceedings of the IEEE International Conference on Acoustics, 2019

Finite Alphabet Iterative Decoding of LDPC Codes with Coarsely Quantized Neural Networks.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Efficient Spectrum Access and Co-Existence With Receiver Nonlinearity: Frameworks and Algorithms.
IEEE Trans. Wirel. Commun., 2018

On Adjacent Channel Co-Existence With Receiver Nonlinearity.
IEEE Trans. Wirel. Commun., 2018

Degrees of Freedom and Achievable Rate of Wide-Band Multi-Cell Multiple Access Channels With No CSIT.
IEEE Trans. Commun., 2018

Online Edge Caching and Wireless Delivery in Fog-Aided Networks With Dynamic Content Popularity.
IEEE J. Sel. Areas Commun., 2018

The Capacity of Private Information Retrieval from Uncoded Storage Constrained Databases.
CoRR, 2018

On the Secure Degrees of Freedom of the K-user Interference Channel with Delayed CSIT.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Approximately Optimal Distributed Data Shuffling.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

The Capacity of Uncoded Storage Constrained PIR.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

PIR from Storage Constrained Databases - Coded Caching Meets PIR.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

On the Secure Degrees of Freedom of 2 x 2 x 2 Multi-Hop Network with Untrusted Relays.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Non-Gaussian Signal Detection: How Much Can Massive MIMO Help?
Proceedings of the 2018 IEEE International Conference on Communications, 2018

On the Capacity of Secure Distributed Matrix Multiplication.
Proceedings of the IEEE Global Communications Conference, 2018

On the Capacity of Secure Distributed Fast Fourier Transform.
Proceedings of the 2018 IEEE Global Conference on Signal and Information Processing, 2018

On the Tradeoff between Mode Collapse and Sample Quality in Generative Adversarial Networks.
Proceedings of the 2018 IEEE Global Conference on Signal and Information Processing, 2018

Context-aware Data Aggregation with Localized Information Privacy.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Interference Channels with Confidential Messages: Scaling up the Secure Degrees of Freedom with No CSIT.
Proceedings of the 52nd Asilomar Conference on Signals, Systems, and Computers, 2018

Flow of Information in Feed-Forward Denoising Neural Networks.
Proceedings of the 17th IEEE International Conference on Cognitive Informatics & Cognitive Computing, 2018

2017
Fog-Aided Wireless Networks for Content Delivery: Fundamental Latency Tradeoffs.
IEEE Trans. Inf. Theory, 2017

Secure Degrees of Freedom Region of the Two-User MISO Broadcast Channel With Alternating CSIT.
IEEE Trans. Inf. Theory, 2017

Improved Approximation of Storage-Rate Tradeoff for Caching With Multiple Demands.
IEEE Trans. Commun., 2017

On the Latency and Energy Efficiency of Distributed Storage Systems.
IEEE Trans. Cloud Comput., 2017

Content Delivery in Fog-Aided Small-Cell Systems with Offline and Online Caching: An Information - Theoretic Analysis.
Entropy, 2017

Combating Computational Heterogeneity in Large-Scale Distributed Computing via Work Exchange.
CoRR, 2017

Private Information Retrieval from Storage Constrained Databases - Coded Caching meets PIR.
CoRR, 2017

Cloud-Aided Edge Caching with Wireless Multicast Fronthauling in Fog Radio Access Networks.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Coding for Efficient Caching in Multicore Embedded Systems.
Proceedings of the 2017 IEEE Computer Society Annual Symposium on VLSI, 2017

On the degrees of freedom of wide-band multi-cell multiple access channels with No CSIT.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Online edge caching in fog-aided wireless networks.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

On scalability and interference avoidance in nonlinear adjacent channel interference networks.
Proceedings of the IEEE International Conference on Communications, 2017

On the secure degrees-of-freedom of partially connected networks with no CSIT.
Proceedings of the IEEE International Conference on Communications, 2017

Blind Cooperative Jamming: Exploiting ISI Heterogeneity to Achieve Positive Secure DoF.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

The capacity of cache aided private information retrieval.
Proceedings of the 55th Annual Allerton Conference on Communication, 2017

Towards the exact rate-memory trade-off for uncoded caching with secure delivery.
Proceedings of the 55th Annual Allerton Conference on Communication, 2017

MIMO wiretap channel with ISI heterogeneity - Achieving secure DoF with no CSI.
Proceedings of the 51st Asilomar Conference on Signals, Systems, and Computers, 2017

Cache-aided content delivery in fog-RAN systems with topological information and no CSI.
Proceedings of the 51st Asilomar Conference on Signals, Systems, and Computers, 2017

2016
Toward Optimal Secure Distributed Storage Systems With Exact Repair.
IEEE Trans. Inf. Theory, 2016

MISO Broadcast Channel With Hybrid CSIT: Beyond Two Users.
IEEE Trans. Inf. Theory, 2016

Cloud and Cache-Aided Wireless Networks: Fundamental Latency Trade-Offs.
CoRR, 2016

Flow of Information in Feed-Forward Deep Neural Networks.
CoRR, 2016

Hierarchical Quickest Change Detection via Surrogates.
CoRR, 2016

Harnessing cloud and edge synergies: toward an information theory of fog radio access networks.
IEEE Commun. Mag., 2016

Seeing the forest for the trees: new approaches to forecasting cascades.
Proceedings of the 8th ACM Conference on Web Science, 2016

Cloud RAN and edge caching: Fundamental performance trade-offs.
Proceedings of the 17th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2016

Cloud-aided wireless networks with edge caching: Fundamental latency trade-offs in fog Radio Access Networks.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Pipelined Fronthaul-Edge Content Delivery in Fog Radio Access Networks.
Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, 2016

Fundamental Limits on Latency in Small-Cell Caching Systems: An Information-Theoretic Analysis.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Information Theoretic Limits of Data Shuffling for Distributed Learning.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Cache aided wireless networks: Tradeoffs between storage and latency.
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016

On the worst-case communication overhead for distributed data shuffling.
Proceedings of the 54th Annual Allerton Conference on Communication, 2016

Layered caching for heterogeneous storage.
Proceedings of the 50th Asilomar Conference on Signals, Systems and Computers, 2016

2015
Distributed Space-Time Interference Alignment With Moderately Delayed CSIT.
IEEE Trans. Wirel. Commun., 2015

Dynamic Resource Allocation for Cooperative Spectrum Sharing in LTE Networks.
IEEE Trans. Veh. Technol., 2015

Perfect Output Feedback in the Two-User Decentralized Interference Channel.
IEEE Trans. Inf. Theory, 2015

Approximate Capacity Region for the Symmetric Gaussian Interference Channel With Noisy Feedback.
IEEE Trans. Inf. Theory, 2015

Fundamental Limits of Caching With Secure Delivery.
IEEE Trans. Inf. Forensics Secur., 2015

PHY-Layer Resiliency in OFDM Communications: A Tutorial.
IEEE Commun. Surv. Tutorials, 2015

Time series forecasting via noisy channel reversal.
Proceedings of the 25th IEEE International Workshop on Machine Learning for Signal Processing, 2015

Beyond cut-set bounds - the approximate capacity of D2D networks.
Proceedings of the 2015 Information Theory and Applications Workshop, 2015

Exact repair for distributed storage systems: Partial characterization via new bounds.
Proceedings of the 2015 Information Theory and Applications Workshop, 2015

Improved approximation of storage-rate tradeoff for caching via new outer bounds.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Secrecy for MISO broadcast channels with heterogeneous CSIT.
Proceedings of the IEEE International Symposium on Information Theory, 2015

New bounds on the (n, k, d) storage systems with exact repair.
Proceedings of the IEEE International Symposium on Information Theory, 2015

A general outer bound for MISO broadcast channel with heterogeneous CSIT.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Online denoising of discrete noisy data.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Linear exact repair rate region of (k + 1, k, k) distributed storage systems: A new approach.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Secrecy for MISO broadcast channels via alternating CSIT.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Three-user MISO broadcast channel: How much can CSIT heterogeneity help?
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Efficient Spectrum Sharing with RF Diversity: Adapting to Nonlinearity of Front Ends.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

On the Symmetric 2-User Deterministic Interference Channel with Confidential Messages.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Uncovering News-Twitter Reciprocity via Interaction Patterns.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Retroactive Antijamming for MISO Broadcast Channels.
IEEE Trans. Inf. Theory, 2014

Distributed Space-Time Interference Alignment.
CoRR, 2014

On the Latency of Erasure-Coded Cloud Storage Systems.
CoRR, 2014

Secure caching with non-uniform demands.
Proceedings of the 4th International Conference on Wireless Communications, 2014

Distributed storage systems with secure and exact repair - New results.
Proceedings of the 2014 Information Theory and Applications Workshop, 2014

Learning distributed caching strategies in small cell networks.
Proceedings of the 11th International Symposium on Wireless Communications Systems, 2014

On multi-user MISO wiretap channels with delayed CSIT.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Decentralized caching with secure delivery.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Symmetric decentralized interference channels with noisy feedback.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

MISO broadcast channels with confidential messages and alternating CSIT.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

On the degrees-of-freedom of the 3-user MISO broadcast channel with hybrid CSIT.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Decentralized interference channels with noisy feedback possess Pareto optimal Nash equilibria.
Proceedings of the 6th International Symposium on Communications, 2014

On secure distributed storage systems with exact repair.
Proceedings of the IEEE International Conference on Communications, 2014

On the latency of heterogeneous MDS queue.
Proceedings of the IEEE Global Communications Conference, 2014

New bounds for distributed storage systems with secure repair.
Proceedings of the 52nd Annual Allerton Conference on Communication, 2014

Network aware spectrum efficiency metric for heterogeneous and dynamic radio environments.
Proceedings of the 48th Asilomar Conference on Signals, Systems and Computers, 2014

2013
Secure Source Coding With a Helper.
IEEE Trans. Inf. Theory, 2013

Discriminatory Lossy Source Coding: Side Information Privacy.
IEEE Trans. Inf. Theory, 2013

Degrees of Freedom Region of the MIMO Interference Channel With Output Feedback and Delayed CSIT.
IEEE Trans. Inf. Theory, 2013

On the Symmetric Feedback Capacity of the $K$-User Cyclic Z-Interference Channel.
IEEE Trans. Inf. Theory, 2013

On the Synergistic Benefits of Alternating CSIT for the MISO Broadcast Channel.
IEEE Trans. Inf. Theory, 2013

On the Feedback Capacity of the Fully Connected $K$-User Interference Channel.
IEEE Trans. Inf. Theory, 2013

Heegard-Berger and Cascade Source Coding Problems With Common Reconstruction Constraints.
IEEE Trans. Inf. Theory, 2013

Towards Optimal Secure Distributed Storage Systems with Exact Repair.
CoRR, 2013

Retroactive Anti-Jamming for MISO Broadcast Channels.
CoRR, 2013

MIMO Radar Waveform Design to Support Spectrum Sharing.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Two-user MISO broadcast channel: Synergistic benefits of alternating CSIT.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

POSTER: Distributed Lagrangean Clustering Protocol.
Proceedings of the Distributed Computing and Networking, 14th International Conference, 2013

Recovery Protocols for Flash File Systems.
Proceedings of the Distributed Computing and Internet Technology, 2013

Jamming countermeasures for multi-user MISO broadcast channels - a DoF perspective.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

CRP: Cluster head Re-election Protocol for heterogeneous wireless sensor networks.
Proceedings of the Fifth International Conference on Communication Systems and Networks, 2013

Even symmetric parallel linear deterministic interference channels are inseparable.
Proceedings of the 51st Annual Allerton Conference on Communication, 2013

Interference alignment for MISO broadcast channels under jamming attacks.
Proceedings of the 2013 Asilomar Conference on Signals, 2013

2012
Minimum CSIT to achieve Maximum Degrees of Freedom for the MISO BC
CoRR, 2012

On the Synergistic Benefits of Alternating CSIT for the MISO BC
CoRR, 2012

Determination Of Optimal Number Of Clusters In Wireless Sensor Networks
CoRR, 2012

On linear deterministic interference channels with partial feedback.
Proceedings of the 2012 Information Theory and Applications Workshop, 2012

On fading broadcast channels with partial channel state information at the transmitter.
Proceedings of the 2012 International Symposium on Wireless Communication Systems (ISWCS), 2012

On X-channels with feedback and delayed CSI.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Gaussian multiple descriptions with common and constrained reconstruction constraints.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Generalized degrees of freedom of the symmetric K-user interference channel with feedback.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

On the sum-capacity of the linear deterministic interference channel with partial feedback.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

On the Heegard-Berger problem with common reconstruction constraints.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Feedback and delayed CSI can be as good as perfect CSI.
Proceedings of IEEE International Conference on Communications, 2012

The Nash equilibrium region of the linear deterministic interference channel with feedback.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

The capacity region of the symmetric linear deterministic interference channel with partial feedback.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

2011
Dependence Balance Based Outer Bounds for Gaussian Networks With Cooperation and Feedback.
IEEE Trans. Inf. Theory, 2011

On Interference Networks with Feedback and Delayed CSI
CoRR, 2011

Competitive privacy in the smart grid: An information-theoretic approach.
Proceedings of the IEEE Second International Conference on Smart Grid Communications, 2011

Multi-user privacy: The Gray-Wyner system and generalized common information.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Cascade source coding with erased side information.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Distributed detection in noisy sensor networks.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

On the capacity region of multiple-access relay channels.
Proceedings of the 45st Annual Conference on Information Sciences and Systems, 2011

On the symmetric feedback capacity of the K-user cyclic interference channel.
Proceedings of the 49th Annual Allerton Conference on Communication, 2011

2010
Capacity Bounds For Multi-User Channels With Feedback, Relaying and Cooperation.
PhD thesis, 2010

Diamond channel with partially separated relays.
Proceedings of the IEEE International Symposium on Information Theory, 2010

2009
Outer bounds for multiple-access channels with feedback using dependence balance.
IEEE Trans. Inf. Theory, 2009

Capacity bounds for the Gaussian interference channel with transmitter cooperation.
Proceedings of the 2009 IEEE Information Theory Workshop, 2009

On the rate-limited Gelfand-Pinsker problem.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Outer bounds for user cooperation.
Proceedings of the IEEE International Symposium on Information Theory, 2009

On the Capacity Region of the Gaussian Multiple Access Channel with Noisy Feedback.
Proceedings of IEEE International Conference on Communications, 2009

2008
A New Upper Bound on the Capacity of a Class of Primitive Relay Channels
CoRR, 2008

A New Upper Bound for a Binary Additive Noisy Multiple Access Channel with Feedback.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008


  Loading...