Publications
Preprints
Dual-Source SPIR over a noiseless MAC without Data Replication or Shared Randomness, R. Chou submitted to IEEE Transactions on Information Theory, Mar. 2025.
Secret-Key Generation from Private Identifiers under Channel Uncertainty, V. Yachongka, R. Chou submitted to IEEE Transactions on Information Forensics and Security, Mar. 2025.
Private Sum Computation: Trade-Offs between
Communication, Randomness, and Privacy, R. Chou, J. Kliewer, A. Yener submitted to IEEE Transactions on Information Theory, Feb. 2025.
Covert Communication and Key Generation Over Quantum State-Dependent Channels, H. ZivariFard, R. Chou, X. Wang submitted to IEEE Transactions on Information Theory, Jan. 2025.
Function Computation Without Secure Links: Information and Leakage Rates, R. Chou, J. Kliewer submitted to IEEE Transactions on Information Theory, Dec. 2024.
Helper-Assisted Coding for Gaussian Wiretap Channels: Deep Learning Meets PhySec, V. Rana, R. Chou, T. Kim submitted to IEEE Transactions on Communications, Dec. 2024.
Multiuser Commitment over Noisy Channels, R. Chou, M. Bloch submitted to IEEE Transactions on Information Theory, Nov. 2024.
Reduced Complexity Interval Passing for Sparse Signal Recovery, S. Habib, R. Chou, T. Kim submitted to IEEE Transactions on Information Theory, Jul. 2024.
Journal Papers
Private Noisy Side Information Helps to Increase the Capacity of SPIR, H. ZivariFard, R. Chou, X. Wang IEEE Transactions on Information Theory, 71(3), Mar. 2025.
The Gaussian Multiple Access Wiretap Channel with Selfish Transmitters: A Coalitional Game Theory Perspective, R. Chou, A. Yener IEEE Transactions on Information Theory, 70(10), Oct. 2024.
Secure Source Coding Resilient Against Compromised Users via an Access Structure, H. ZivariFard, R. Chou IEEE Journal on Selected Areas in Information Theory, 5, Jun. 2024.
Secure Distributed Storage: Optimal Trade-Off Between Storage Rate and Privacy Leakage, R. Chou, J. Kliewer IEEE Transactions on Information Theory, 70(5), May 2024.
Distributed Secret Sharing over a Public Channel from Correlated Random Variables, R. Chou IEEE Transactions on Information Theory, 70(4), Apr. 2024.
Private Information Retrieval with Private Noisy Side Information, H. ZivariFard, R. Chou IEEE Transactions on Information Theory, 70(4), Apr. 2024.
Short Blocklength Wiretap Channel Codes via Deep Learning: Design and Performance Evaluation, V. Rana, R. Chou IEEE Transactions on Communications, 71(3), Mar. 2023.
Explicit Wiretap Channel Codes via Source Coding, Universal Hashing, and Distribution Approximation, When the Channels’ Statistics are Uncertain, R. Chou IEEE Transactions on Information Forensics and Security, 18, 2023.
Quantifying the Cost of Privately Storing Data in Distributed Storage Systems, R. Chou IEEE Transactions on Information Theory, 68(11), Nov. 2022.
Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-aided Eavesdropper, R. Chou, A. Yener Entropy: Special Issue on Information Theoretic Methods for Future Communication Systems, 24(11), Nov. 2022, invited paper.
Multiple Access Channel Resolvability Codes from Source Resolvability Codes, R. Sultana, R. Chou IEEE Transactions on Information Theory, 68(6), Jun. 2022.
Private Classical Communication over Quantum Multiple-Access Channels, R. Chou IEEE Transactions on Information Theory, 68(3), Mar. 2022.
Information-Theoretic Secret Sharing from Correlated Gaussian Random Variables and Public Communication, V. Rana, R. Chou, H. Kwon IEEE Transactions on Information Theory, 68(1), Jan. 2022.
Universal Covertness for Discrete Memoryless Sources, R. Chou, M. Bloch, A. Yener IEEE Transactions on Information Theory, 67(8), Aug. 2021.
Strongly Secure Multiuser Communication and Authentication with Anonymity Constraints, R. Chou, A. Yener IEEE Transactions on Information Theory, 66(1), Jan. 2020.
Secret-Key Generation in Many-to-One Networks: An Integrated Game-Theoretic and Information-Theoretic Approach, R. Chou, A. Yener IEEE Transactions on Information Theory, 65(8), Aug. 2019.
Polar Coding for the Multiple Access Wiretap Channel via Rate-Splitting and Cooperative Jamming, R. Chou, A. Yener IEEE Transactions on Information Theory, 64(12), Dec. 2018.
Empirical and Strong Coordination via Soft Covering with Polar Codes, R. Chou, M. Bloch, J. Kliewer IEEE Transactions on Information Theory, 64(7), Jul. 2018.
Coding Schemes for Achieving Strong Secrecy at Negligible Cost, R. Chou, B. Vellambi, M. Bloch, J. Kliewer IEEE Transactions on Information Theory, 63(3), Mar. 2017.
Polar Coding for the Broadcast Channel with Confidential Messages: A Random Binning Analogy, R. Chou, M. Bloch IEEE Transactions on Information Theory, 62(5), May 2016.
Polar Coding for Secret-Key Generation, R. Chou, M. Bloch, E. Abbe IEEE Transactions on Information Theory, 61(11), Nov. 2015.
Separation of Reliability and Secrecy in Rate-Limited Secret-Key Generation, R. Chou, M. Bloch IEEE Transactions on Information Theory, 60(8), Aug. 2014.
Conference Papers
Covert Communication with Positive Rate Over State-Dependent Quantum Channels, H. ZivariFard, R. Chou, X. Wang Proc. of the IEEE Information Theory Workshop, ITW’24, Shenzen, China, Nov. 2024.
Secret-Key Generation with PUFs and Biometric Identifiers for Compound Authentication Channels, V. Yachongka, R. Chou Proc. of the IEEE Information Theory Workshop, ITW’24, Shenzen, China, Nov. 2024.
SPIR with Colluding and Non-Replicated Servers from a Noisy Channel, A. Shekofteh, R. Chou Proc. of the 60th Annual Allerton Conference on Communication, Control, and Computing, Allerton’24, Monticello, IL, Sep. 2024.
Distributed Matrix Multiplication: Download Rate, Randomness and Privacy Trade-Offs, A. Morteza, R. Chou Proc. of the 60th Annual Allerton Conference on Communication, Control, and Computing, Allerton’24, Monticello, IL, Sep. 2024.
Dual-Source Symmetric PIR without Data Replication or Shared Randomness, R. Chou Proc. of the IEEE International Symposium on Information Theory, ISIT’24, Athens, Greece, Jul. 2024.
The Capacity of Symmetric Private Information Retrieval with Private Noisy Side Information, H. ZivariFard, R. Chou, X. Wang Proc. of the IEEE International Symposium on Information Theory, ISIT’24, Athens, Greece, Jul. 2024.
Private Sum Computation: Trade-Off between Shared Randomness and Privacy, R. Chou, J. Kliewer, A. Yener Proc. of the IEEE International Symposium on Information Theory, ISIT’24, Athens, Greece, Jul. 2024.
Short Blocklength Secret Coding via Helper-Assisted Learning over the Wiretap Channel, V. Rana, R. Chou, T. Kim Proc. of the IEEE International Conference on Communications, Denver, CO, Jun. 2024.
Distributed Storage Over a Public Channel: Trade-off between Privacy and Shared Key Lengths, M. Keshvari, R. Chou Proc. of the 59th Annual Allerton Conference on Communication, Control, and Computing, Allerton’23, Monticello, IL, Sep. 2023.
Secure Distributed Storage: Optimal Trade-Off Between Storage Rate and Privacy Leakage, R. Chou, J. Kliewer Proc. of the IEEE International Symposium on Information Theory, ISIT’23, Taipei, Taiwan, Jun. 2023.
Secret Sharing over a Gaussian Broadcast Channel: Optimal Coding Scheme Design and Deep Learning Approach at Short Blocklength, R. Sultana, V. Rana, R. Chou Proc. of the IEEE International Symposium on Information Theory, ISIT’23, Taipei, Taiwan, Jun. 2023.
Private Information Retrieval When Private Noisy Side Information is Available, H. ZivariFard, R. Chou Proc. of the IEEE International Symposium on Information Theory, ISIT’23, Taipei, Taiwan, Jun. 2023.
Retractable Commitment Over Noisy Channels, R. Chou, M. Bloch Proc. of the IEEE Information Theory Workshop, ITW’23, Saint-Malo, France, Apr. 2023.
Adaptive Frequency Hopping for 5G New Radio mMTC Security, W. Chan, H. Kwon, R. Chou, D. Love, S. Fahmy, S. Rafiul Hussain, S. Kim, C. Vander Valk, C. Brinton, V. Marojevic, K. Pham, T. Kim Proc. of the 24th Annual International Conference on Industrial Technology (ICIT), Orlando, FL, Apr. 2023.
Secure Data Storage Resilient Against Compromised Users via an Access Structure, H. ZivariFard, R. Chou Proc. of the IEEE Information Theory Workshop, ITW’22, Mumbai, India, Nov. 2022.
Commitment over Multiple-Access Channels, R. Chou, M. Bloch Proc. of the 58th Annual Allerton Conference on Communication, Control, and Computing, Allerton’22, Monticello, IL, Sep. 2022.
Quantifying the Cost of Privately Storing Data in Distributed Storage Systems, R. Chou Proc. of the IEEE International Symposium on Information Theory, ISIT’22, Espoo, Finland, Jun. 2022.
Function Computation Without Secure Links: Information and Leakage Rates, R. Chou, J. Kliewer Proc. of the IEEE International Symposium on Information Theory, ISIT’22, Espoo, Finland, Jun. 2022.
Design of Short Blocklength Wiretap Channel Codes: Deep Learning and Cryptography Working Hand in Hand, V. Rana, R. Chou Proc. of the IEEE Information Theory Workshop, ITW’21, Kanazawa, Japan, Oct. 2021.
Private Classical Communication over Quantum Multiple-Access Channels, R. Chou Proc. of the IEEE International Symposium on Information Theory, ISIT’21, Melbourne, Australia, Jul. 2021.
Low-Complexity Secret Sharing Schemes Using Correlated Random Variables and Rate-Limited Public Communication, R. Sultana, R. Chou Proc. of the IEEE International Symposium on Information Theory, ISIT’21, Melbourne, Australia, Jul. 2021.
Pairwise Oblivious Transfer, R. Chou Proc. of the IEEE Information Theory Workshop, ITW’20, Riva del Garda, Italy, Apr. 2021.
Secret Sharing from Correlated Gaussian Random Variables and Public Communication, V. Rana, R. Chou, H. Kwon Proc. of the IEEE Information Theory Workshop, ITW’20, Riva del Garda, Italy, Apr. 2021.
Explicit Construction of Multiple Access Channel Resolvability Codes from Source Resolvability Codes, R. Sultana, R. Chou Proc. of the IEEE International Symposium on Information Theory, ISIT’20, Los Angeles, CA, Jun. 2020.
Secure Distributed Storage: Rate-Privacy Trade-Off and XOR-Based Coding Scheme, R. Chou, J. Kliewer Proc. of the IEEE International Symposium on Information Theory, ISIT’20, Los Angeles, CA, Jun. 2020.
Explicit Low-complexity Codes for Multiple Access Channel Resolvability, R. Sultana, R. Chou Proc. of the 57th Annual Allerton Conference on Communication, Control, and Computing, Allerton’19, Monticello, IL, Sep. 2019.
Biometric Systems with Multiuser Access Structures, R. Chou Proc. of the IEEE International Symposium on Information Theory, ISIT’19, Paris, France, Jul. 2019.
The Degraded Gaussian Many-Access Wiretap Channel, R. Chou, A. Yener Proc. of the IEEE International Symposium on Information Theory, ISIT’19, Paris, France, Jul. 2019.
Secret Sharing over a Public Channel from Correlated Random Variables, R. Chou Proc. of the IEEE International Symposium on Information Theory, ISIT’18, Vail, CO, Jun. 2018.
Explicit Codes for the Wiretap Channel with Uncertainty on the Eavesdropper's Channel, R. Chou Proc. of the IEEE International Symposium on Information Theory, ISIT’18, Vail, CO, Jun. 2018.
Optimal Resource Allocation for SWIPT with Full-Duplex Operation and Secrecy, T. Zewde, R. Chou, M. C. Gursoy Proc. of the IEEE International Conference on Communications: Workshop on Energy Harvesting Wireless Communications, Kansas City, MO, May 2018.
A Game Theoretic Treatment for Pair-wise Secret-Key Generation in Many-to-One Networks, R. Chou, A. Yener Proc. of the IEEE International Symposium on Information Theory, ISIT’17, Aachen, Germany, Jun. 2017.
The Degraded Gaussian Multiple Access Wiretap Channel with Selfish Transmitters: A Coalitional Game Theory Perspective, R. Chou, A. Yener Proc. of the IEEE International Symposium on Information Theory, ISIT’17, Aachen, Germany, Jun. 2017.
The Gaussian Multiple Access Wiretap Channel when the Eavesdropper can Arbitrarily Jam, R. Chou, A. Yener Proc. of the IEEE International Symposium on Information Theory, ISIT’17, Aachen, Germany, Jun. 2017.
Universal Covertness for Discrete Memoryless Sources, R. Chou, M. Bloch, A. Yener Proc. of the 54th Annual Allerton Conference on Communication, Control, and Computing, Allerton’16, Monticello, IL, Sep. 2016.
Multiuser Authentication with Anonymity Constraints over Noisy Channels, R. Chou, A. Yener Proc. of the IEEE International Symposium on Information Theory, ISIT’16, Barcelona, Spain, Jul. 2016.
Polar Coding for the Multiple Access Wiretap Channel via Rate-Splitting and Cooperative Jamming, R. Chou, A. Yener Proc. of the IEEE International Symposium on Information Theory, ISIT’16, Barcelona, Spain, Jul. 2016.
Using Deterministic Decisions for Low-Entropy Bits in the Encoding and Decoding of Polar Codes, R. Chou, M. Bloch Proc. of the 53rd Annual Allerton Conference on Communication, Control, and Computing, Allerton’15, Monticello, IL, Oct. 2015.
Polar Coding for Empirical and Strong Coordination via Distribution Approximation, R. Chou, M. Bloch, J. Kliewer Proc. of the IEEE International Symposium on Information Theory, ISIT’15, Hong Kong, Jun. 2015.
Lossless and Lossy Source Compression with Near-Uniform Output: Is Common Randomness Always Required?, B. Vellambi, M. Bloch, R. Chou, J. Kliewer Proc. of the IEEE International Symposium on Information Theory, ISIT’15, Hong Kong, Jun. 2015.
Polar Coding for the Broadcast Channel with Confidential Messages, R. Chou, M. Bloch Proc. of the IEEE Information Theory Workshop, ITW’15, Jerusalem, Israel, Apr. 2015.
Low-Complexity Channel Resolvability Codes for the Symmetric Multiple-Access Channel, R. Chou, M. Bloch, J. Kliewer Proc. of the IEEE Information Theory Workshop, ITW’14, Hobart, Tasmania, Nov. 2014.
Uniform Distributed Source Coding for the Multiple Access Wiretap Channel, R. Chou, M. Bloch Proc. of the IEEE Conference on Communications and Network Security, CNS’14, San Francisco, CA, Oct. 2014.
Secret-Key Generation with Arbitrarily Varying Eavesdropper's Channel, R. Chou, M. Bloch Proc. of the IEEE Global Conference on Signal and Information Processing, GlobalSIP’13, Austin, TX, Dec. 2013.
Polar Coding for Secret-Key Generation, R. Chou, M. Bloch, E. Abbe Proc. of the IEEE Information Theory Workshop, ITW’13, Seville, Spain, Sep. 2013.
Data Compression with Nearly Uniform Output, R. Chou, M. Bloch Proc. of the IEEE International Symposium on Information Theory, ISIT’13, Istanbul, Turkey, Jul. 2013.
Experimental Aspects of Secret-Key Generation in Wireless Environments, A. Pierrot, R. Chou, M. Bloch Proc. of the IEEE International Workshop on Signal Processing Advances in Wireless Communications, SPAWC’13, Darmstadt, Germany, Jun. 2013.
One-Way Rate-Limited Sequential Key-Distillation, R. Chou, M. Bloch Proc. of the IEEE International Symposium on Information Theory, ISIT’12, Cambridge, MA, Jul. 2012.
Performance Evaluation for Particle Filters, R. Chou, Y. Boers, M. Podt, M. Geist Proc. of the 14th International Conference on Information Fusion, Fusion’11, Chicago, IL, Jul. 2011.
|