Saikat Guha

According to our database1, Saikat Guha authored at least 115 papers between 2004 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
On the Analysis of a Multipartite Entanglement Distribution Switch.
Proc. ACM Meas. Anal. Comput. Syst., 2020

Fundamental Limits of Quantum-Secure Covert Communication Over Bosonic Channels.
IEEE J. Sel. Areas Commun., 2020

Quantum-Message-Passing Receiver for Quantum-Enhanced Classical Communications.
CoRR, 2020

Quantum Advantage via Qubit Belief Propagation.
Proceedings of the IEEE International Symposium on Information Theory, 2020

Infinite-fold enhancement in communications capacity using pre-shared entanglement.
Proceedings of the IEEE International Symposium on Information Theory, 2020

2019
On the Stochastic Analysis of a Quantum Entanglement Switch.
SIGMETRICS Perform. Evaluation Rev., 2019

Second-order coding rates for key distillation in quantum key distribution.
CoRR, 2019

Performance Evaluation of a Quantum Entanglement Switch.
CoRR, 2019

Secret key distillation across a quantum wiretap channel under restricted eavesdropping.
CoRR, 2019

On the Capacity Region of Bipartite and Tripartite Entanglement Switching.
CoRR, 2019

Secret key distillation over a pure loss quantum wiretap channel under restricted eavesdropping.
Proceedings of the IEEE International Symposium on Information Theory, 2019

2018
Covert Wireless Communication With Artificial Noise Generation.
IEEE Trans. Wirel. Commun., 2018

Multi-Hop Routing in Covert Wireless Networks.
IEEE Trans. Wirel. Commun., 2018

On a Class of Stochastic Multilayer Networks.
Proc. ACM Meas. Anal. Comput. Syst., 2018

Covert Communications in a Dynamic Interference Environment.
Proceedings of the 19th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2018

Noisy Feedback and Loss Unlimited Private Communication.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

2017
Covert Communication in the Presence of an Uninformed Jammer.
IEEE Trans. Wirel. Commun., 2017

Fundamental limit of resolving two point sources limited by an arbitrary point spread function.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

A de Bruijn identity for discrete random variables.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Optimal covert communications using pulse-position modulation.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Fundamental limits of quantum-secure covert optical sensing.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Exploring the dynamics of search advertiser fraud.
Proceedings of the 2017 Internet Measurement Conference, 2017

Covert communications on continuous-time channels in the presence of jamming.
Proceedings of the 51st Asilomar Conference on Signals, Systems, and Computers, 2017

Covert active sensing of linear systems.
Proceedings of the 51st Asilomar Conference on Signals, Systems, and Computers, 2017

2016
Superadditivity of Quantum Channel Coding Rate With Finite Blocklength Joint Measurements.
IEEE Trans. Inf. Theory, 2016

How Much is Your Attention Worth?: Analysis of Prices in LinkedIn Advertising Network - Short talk.
SIGMETRICS Perform. Evaluation Rev., 2016

Second-order coding rates for pure-loss bosonic channels.
Quantum Inf. Process., 2016

Covert Communications When the Warden Does Not Know the Background Noise Power.
IEEE Commun. Lett., 2016

Thermal states minimize the output entropy of single-mode phase-insensitive Gaussian channels with an input entropy constraint.
CoRR, 2016

On capacity of optical communications over a lossy bosonic channel with a receiver employing the most general coherent electro-optic feedback control.
CoRR, 2016

Covert communication over classical-quantum channels.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Thinning, photonic beamsplitting, and a general discrete Entropy power Inequality.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Targeting algorithms for online social advertising markets.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

2015
Hiding information in noise: fundamental limits of covert wireless communication.
IEEE Commun. Mag., 2015

Efficient multicast in hybrid wireless networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Interpreting Advertiser Intent in Sponsored Search.
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2015

Finite codelength analysis of the sequential waveform nulling receiver for M-ary PSK.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Optimal multicast in dense multi-channel multi-radio wireless networks.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Empirical Analysis of Search Advertising Strategies.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

Strength in Numbers: Robust Tamper Detection in Crowd Computations.
Proceedings of the 2015 ACM on Conference on Online Social Networks, 2015

Covert communication with the help of an uninformed jammer achieves positive rate.
Proceedings of the 49th Asilomar Conference on Signals, Systems and Computers, 2015

2014
The Squashed Entanglement of a Quantum Channel.
IEEE Trans. Inf. Theory, 2014

Covert Optical Communication.
CoRR, 2014

Quantum-noise limited communication with low probability of detection.
CoRR, 2014

No "one-size fits all": towards a principled approach for incentives in mobile crowdsourcing.
Proceedings of the 15th Workshop on Mobile Computing Systems and Applications, 2014

Towards Detecting Anomalous User Behavior in Online Social Networks.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Bootstrapping Privacy Compliance in Big Data Systems.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Squashed entanglement and the two-way assisted capacities of a quantum channel.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Capacity of optical communication in loss and noise with general quantum Gaussian receivers.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Optimal measurements for symmetric quantum states with applications to optical quantum communication.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Superadditivity of quantum channel coding rate with finite blocklength quantum measurements.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Characterizing Large-Scale Click Fraud in ZeroAccess.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Covert single-hop communication in a wireless network with distributed artificial noise generation.
Proceedings of the 52nd Annual Allerton Conference on Communication, 2014

2013
Polar Codes for Degradable Quantum Channels.
IEEE Trans. Inf. Theory, 2013

Polar Codes for Classical-Quantum Channels.
IEEE Trans. Inf. Theory, 2013

Quantum enigma machines and the locking capacity of a quantum channel.
CoRR, 2013

Multicasting under multi-domain and hierarchical constraints.
Proceedings of the 11th International Symposium and Workshops on Modeling and Optimization in Mobile, 2013

Verito: A Practical System for Transparency and Accountability in Virtual Economies.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Self-Optimization in Future Hybrid Networks.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Achieving the Holevo capacity of a pure state classical-quantum channel via unambiguous state discrimination.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

A realizable receiver for discriminating arbitrary coherent states near the quantum limit.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Quantum noise limited optical communication with low probability of detection.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

ViceROI: catching click-spam in search ad networks.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Capacity of optical reading, Part 1: Reading boundless error-free bits using a single photon
CoRR, 2012

Information trade-offs for optical quantum communication
CoRR, 2012

Explicit capacity-achieving receivers for optical communication and quantum reading
CoRR, 2012

Optimal sampling strategies for minimum latency routing with imperfect link state.
Proceedings of the 10th International Symposium on Modeling and Optimization in Mobile, 2012

Measuring and fingerprinting click-spam in ad networks.
Proceedings of the ACM SIGCOMM 2012 Conference, 2012

Koi: A Location-Privacy Platform for Smartphone Apps.
Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation, 2012

RadioJockey: mining program execution to optimize cellular radio usage.
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012

Explicit receivers for pure-interference bosonic multiple access channels.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

Explicit capacity-achieving receivers for optical communication and quantum reading.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Quantum M-ary phase shift keying.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Polar coding to achieve the Holevo capacity of a pure-loss optical channel.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Act for affordable data care.
Proceedings of the 11th ACM Workshop on Hot Topics in Networks, 2012

Percolation phenomena in networks under random dynamics.
Proceedings of the Fourth International Conference on Communication Systems and Networks, 2012

Generalized resource allocation for the cloud.
Proceedings of the ACM Symposium on Cloud Computing, SOCC '12, 2012

Performance of polar codes for quantum and private classical communication.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

2011
Green Wave Sleep Scheduling: Optimizing Latency and Throughput in Duty Cycling Wireless Networks.
IEEE J. Sel. Areas Commun., 2011

Quantum trade-off coding for bosonic communication
CoRR, 2011

Structured optical receivers to attain superadditive capacity and the Holevo limit.
CoRR, 2011

Privad: Practical Privacy in Online Advertising.
Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation, 2011

The free space optical interference channel.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

On quantum limit of optical communications: Concatenated codes and joint-detection receivers.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

On capacity of optical channels with coherent detection.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Auctions in do-not-track compliant internet advertising.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Effect of limited topology knowledge on opportunistic forwarding in ad hoc wireless networks.
Proceedings of the 8th International Symposium on Modeling and Optimization in Mobile, Ad-Hoc and Wireless Networks (WiOpt 2010), May 31, 2010

Glasnost: Enabling End Users to Detect Traffic Differentiation.
Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, 2010

PPM demodulation: On approaching fundamental limits of optical communications.
Proceedings of the IEEE International Symposium on Information Theory, 2010

Green Wave: Latency and Capacity-Efficient Sleep Scheduling for Wireless Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Challenges in measuring online advertising systems.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010

2009
NAT Behavioral Requirements for ICMP.
RFC, April, 2009

Receiver design to harness quantum illumination advantage.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Not All Adware Is Badware: Towards Privacy-Aware Advertising.
Proceedings of the Software Services for e-Business and e-Society, 2009

Serving Ads from localhost for Performance, Privacy, and Profit.
Proceedings of the Eight ACM Workshop on Hot Topics in Networks (HotNets-VIII), 2009

2008
NAT Behavioral Requirements for TCP.
RFC, October, 2008

Multiple-user quantum information theory for optical communication channels.
PhD thesis, 2008

NOYB: privacy in online social networks.
Proceedings of the first Workshop on Online Social Networks, 2008

Capacity of the bosonic wiretap channel and the Entropy Photon-Number Inequality.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Quasar: a probabilistic publish-subscribe system for social networks.
Proceedings of the 7th international conference on Peer-to-peer systems, 2008

How healthy are today's enterprise networks?
Proceedings of the 8th ACM SIGCOMM Internet Measurement Conference, 2008

2007
Convolutional and Tail-Biting Quantum Error-Correcting Codes.
IEEE Trans. Inf. Theory, 2007

The Entropy Photon-Number Inequality and its Consequences.
CoRR, 2007

Is high-quality vod feasible using P2P swarming?
Proceedings of the 16th International Conference on World Wide Web, 2007

An end-middle-end approach to connection establishment.
Proceedings of the ACM SIGCOMM 2007 Conference on Applications, 2007

Identity Trail: Covert Surveillance Using DNS.
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007

Classical Information Capacity of the Bosonic Broadcast Channel.
Proceedings of the IEEE International Symposium on Information Theory, 2007

Exploring VoD in P2P Swarming Systems.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

2006
An Experimental Study of the Skype Peer-to-Peer VoIP System.
Proceedings of the 5th International workshop on Peer-To-Peer Systems, 2006

2005

Sextant: a unified node and event localization framework using non-convex constraints.
Proceedings of the 6th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2005

Simple rate-1/3 convolutional and tail-biting quantum error-correcting codes.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

Characterization and Measurement of TCP Traversal Through NATs and Firewalls.
Proceedings of the 5th Internet Measurement Conference, 2005

2004
Classical capacity of free-space optical communication.
Quantum Inf. Comput., 2004

Information capacity of bosonic channels.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004


  Loading...