Publications

Preprints


  1. Secure Source Coding Resilient Against Compromised Users via an Access Structure,
    H. ZivariFard, R. Chou
    submitted to IEEE Journal on Selected Areas in Information Theory, Dec. 2023.

  2. Private Noisy Side Information Helps to Increase the Capacity of SPIR,
    H. ZivariFard, R. Chou, X. Wang
    submitted to IEEE Transactions on Information Theory, Nov. 2023.

  3. The Gaussian Multiple Access Wiretap Channel with Selfish Transmitters: A Coalitional Game Theory Perspective,
    R. Chou, A. Yener
    submitted to IEEE Transactions on Information Theory, Jan. 2023.

Journal Papers


  1. Secure Distributed Storage: Optimal Trade-Off Between Storage Rate and Privacy Leakage,
    R. Chou, J. Kliewer
    IEEE Transactions on Information Theory, to appear, 2024.

  2. Distributed Secret Sharing over a Public Channel from Correlated Random Variables,
    R. Chou
    IEEE Transactions on Information Theory, 70(4), Apr. 2024.

  3. Private Information Retrieval with Private Noisy Side Information,
    H. ZivariFard, R. Chou
    IEEE Transactions on Information Theory, 70(4), Apr. 2024.

  4. Short Blocklength Wiretap Channel Codes via Deep Learning: Design and Performance Evaluation,
    V. Rana, R. Chou
    IEEE Transactions on Communications, 71(3), Mar. 2023.

  5. Explicit Wiretap Channel Codes via Source Coding, Universal Hashing, and Distribution Approximation, When the Channels’ Statistics are Uncertain,
    R. Chou
    IEEE Transactions on Information Forensics and Security, 18, 2023.

  6. Quantifying the Cost of Privately Storing Data in Distributed Storage Systems,
    R. Chou
    IEEE Transactions on Information Theory, 68(11), Nov. 2022.

  7. Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-aided Eavesdropper,
    R. Chou, A. Yener
    Entropy: Special Issue on Information Theoretic Methods for Future Communication Systems, 24(11), Nov. 2022, invited paper.

  8. Multiple Access Channel Resolvability Codes from Source Resolvability Codes,
    R. Sultana, R. Chou
    IEEE Transactions on Information Theory, 68(6), Jun. 2022.

  9. Private Classical Communication over Quantum Multiple-Access Channels,
    R. Chou
    IEEE Transactions on Information Theory, 68(3), Mar. 2022.

  10. Information-Theoretic Secret Sharing from Correlated Gaussian Random Variables and Public Communication,
    V. Rana, R. Chou, H. Kwon
    IEEE Transactions on Information Theory, 68(1), Jan. 2022.

  11. Universal Covertness for Discrete Memoryless Sources,
    R. Chou, M. Bloch, A. Yener
    IEEE Transactions on Information Theory, 67(8), Aug. 2021.

  12. Strongly Secure Multiuser Communication and Authentication with Anonymity Constraints,
    R. Chou, A. Yener
    IEEE Transactions on Information Theory, 66(1), Jan. 2020.

  13. Secret-Key Generation in Many-to-One Networks: An Integrated Game-Theoretic and Information-Theoretic Approach,
    R. Chou, A. Yener
    IEEE Transactions on Information Theory, 65(8), Aug. 2019.

  14. Polar Coding for the Multiple Access Wiretap Channel via Rate-Splitting and Cooperative Jamming,
    R. Chou, A. Yener
    IEEE Transactions on Information Theory, 64(12), Dec. 2018.

  15. Empirical and Strong Coordination via Soft Covering with Polar Codes,
    R. Chou, M. Bloch, J. Kliewer
    IEEE Transactions on Information Theory, 64(7), Jul. 2018.

  16. Coding Schemes for Achieving Strong Secrecy at Negligible Cost,
    R. Chou, B. Vellambi, M. Bloch, J. Kliewer
    IEEE Transactions on Information Theory, 63(3), Mar. 2017.

  17. Polar Coding for the Broadcast Channel with Confidential Messages: A Random Binning Analogy,
    R. Chou, M. Bloch
    IEEE Transactions on Information Theory, 62(5), May 2016.

  18. Polar Coding for Secret-Key Generation,
    R. Chou, M. Bloch, E. Abbe
    IEEE Transactions on Information Theory, 61(11), Nov. 2015.

  19. Separation of Reliability and Secrecy in Rate-Limited Secret-Key Generation,
    R. Chou, M. Bloch
    IEEE Transactions on Information Theory, 60(8), Aug. 2014.

Conference Papers


  1. Short Blocklength Secret Coding via Helper-Assisted Learning over the Wiretap Channel,
    V. Rana, R. Chou, T. Kim
    Proc. of the IEEE International Conference on Communications, Denver, CO, Jun. 2024.

  2. Distributed Storage Over a Public Channel: Trade-off between Privacy and Shared Key Lengths,
    M. Keshvari, R. Chou
    Proc. of the 59th Annual Allerton Conference on Communication, Control, and Computing, Allerton’23, Monticello, IL, Sep. 2023.

  3. Secure Distributed Storage: Optimal Trade-Off Between Storage Rate and Privacy Leakage,
    R. Chou, J. Kliewer
    Proc. of the IEEE International Symposium on Information Theory, ISIT’23, Taipei, Taiwan, Jun. 2023.

  4. Secret Sharing over a Gaussian Broadcast Channel: Optimal Coding Scheme Design and Deep Learning Approach at Short Blocklength,
    R. Sultana, V. Rana, R. Chou
    Proc. of the IEEE International Symposium on Information Theory, ISIT’23, Taipei, Taiwan, Jun. 2023.

  5. Private Information Retrieval When Private Noisy Side Information is Available,
    H. ZivariFard, R. Chou
    Proc. of the IEEE International Symposium on Information Theory, ISIT’23, Taipei, Taiwan, Jun. 2023.

  6. Retractable Commitment Over Noisy Channels,
    R. Chou, M. Bloch
    Proc. of the IEEE Information Theory Workshop, ITW’23, Saint-Malo, France, Apr. 2023.

  7. Adaptive Frequency Hopping for 5G New Radio mMTC Security,
    W. Chan, H. Kwon, R. Chou, D. Love, S. Fahmy, S. Rafiul Hussain, S. Kim, C. Vander Valk, C. Brinton, V. Marojevic, K. Pham, T. Kim
    Proc. of the 24th Annual International Conference on Industrial Technology (ICIT), Orlando, FL, Apr. 2023.

  8. Secure Data Storage Resilient Against Compromised Users via an Access Structure,
    H. ZivariFard, R. Chou
    Proc. of the IEEE Information Theory Workshop, ITW’22, Mumbai, India, Nov. 2022.

  9. Commitment over Multiple-Access Channels,
    R. Chou, M. Bloch
    Proc. of the 58th Annual Allerton Conference on Communication, Control, and Computing, Allerton’22, Monticello, IL, Sep. 2022.

  10. Quantifying the Cost of Privately Storing Data in Distributed Storage Systems,
    R. Chou
    Proc. of the IEEE International Symposium on Information Theory, ISIT’22, Espoo, Finland, Jun. 2022.

  11. Function Computation Without Secure Links: Information and Leakage Rates,
    R. Chou, J. Kliewer
    Proc. of the IEEE International Symposium on Information Theory, ISIT’22, Espoo, Finland, Jun. 2022.

  12. Design of Short Blocklength Wiretap Channel Codes: Deep Learning and Cryptography Working Hand in Hand,
    V. Rana, R. Chou
    Proc. of the IEEE Information Theory Workshop, ITW’21, Kanazawa, Japan, Oct. 2021.

  13. Private Classical Communication over Quantum Multiple-Access Channels,
    R. Chou
    Proc. of the IEEE International Symposium on Information Theory, ISIT’21, Melbourne, Australia, Jul. 2021.

  14. Low-Complexity Secret Sharing Schemes Using Correlated Random Variables and Rate-Limited Public Communication,
    R. Sultana, R. Chou
    Proc. of the IEEE International Symposium on Information Theory, ISIT’21, Melbourne, Australia, Jul. 2021.

  15. Pairwise Oblivious Transfer,
    R. Chou
    Proc. of the IEEE Information Theory Workshop, ITW’20, Riva del Garda, Italy, Apr. 2021.

  16. Secret Sharing from Correlated Gaussian Random Variables and Public Communication,
    V. Rana, R. Chou, H. Kwon
    Proc. of the IEEE Information Theory Workshop, ITW’20, Riva del Garda, Italy, Apr. 2021.

  17. Explicit Construction of Multiple Access Channel Resolvability Codes from Source Resolvability Codes,
    R. Sultana, R. Chou
    Proc. of the IEEE International Symposium on Information Theory, ISIT’20, Los Angeles, CA, Jun. 2020.

  18. Secure Distributed Storage: Rate-Privacy Trade-Off and XOR-Based Coding Scheme,
    R. Chou, J. Kliewer
    Proc. of the IEEE International Symposium on Information Theory, ISIT’20, Los Angeles, CA, Jun. 2020.

  19. Explicit Low-complexity Codes for Multiple Access Channel Resolvability,
    R. Sultana, R. Chou
    Proc. of the 57th Annual Allerton Conference on Communication, Control, and Computing, Allerton’19, Monticello, IL, Sep. 2019.

  20. Biometric Systems with Multiuser Access Structures,
    R. Chou
    Proc. of the IEEE International Symposium on Information Theory, ISIT’19, Paris, France, Jul. 2019.

  21. The Degraded Gaussian Many-Access Wiretap Channel,
    R. Chou, A. Yener
    Proc. of the IEEE International Symposium on Information Theory, ISIT’19, Paris, France, Jul. 2019.

  22. Secret Sharing over a Public Channel from Correlated Random Variables,
    R. Chou
    Proc. of the IEEE International Symposium on Information Theory, ISIT’18, Vail, CO, Jun. 2018.

  23. Explicit Codes for the Wiretap Channel with Uncertainty on the Eavesdropper's Channel,
    R. Chou
    Proc. of the IEEE International Symposium on Information Theory, ISIT’18, Vail, CO, Jun. 2018.

  24. Optimal Resource Allocation for SWIPT with Full-Duplex Operation and Secrecy,
    T. Zewde, R. Chou, M. C. Gursoy
    Proc. of the IEEE International Conference on Communications: Workshop on Energy Harvesting Wireless Communications, Kansas City, MO, May 2018.

  25. A Game Theoretic Treatment for Pair-wise Secret-Key Generation in Many-to-One Networks,
    R. Chou, A. Yener
    Proc. of the IEEE International Symposium on Information Theory, ISIT’17, Aachen, Germany, Jun. 2017.

  26. The Degraded Gaussian Multiple Access Wiretap Channel with Selfish Transmitters: A Coalitional Game Theory Perspective,
    R. Chou, A. Yener
    Proc. of the IEEE International Symposium on Information Theory, ISIT’17, Aachen, Germany, Jun. 2017.

  27. The Gaussian Multiple Access Wiretap Channel when the Eavesdropper can Arbitrarily Jam,
    R. Chou, A. Yener
    Proc. of the IEEE International Symposium on Information Theory, ISIT’17, Aachen, Germany, Jun. 2017.

  28. Universal Covertness for Discrete Memoryless Sources,
    R. Chou, M. Bloch, A. Yener
    Proc. of the 54th Annual Allerton Conference on Communication, Control, and Computing, Allerton’16, Monticello, IL, Sep. 2016.

  29. Multiuser Authentication with Anonymity Constraints over Noisy Channels,
    R. Chou, A. Yener
    Proc. of the IEEE International Symposium on Information Theory, ISIT’16, Barcelona, Spain, Jul. 2016.

  30. Polar Coding for the Multiple Access Wiretap Channel via Rate-Splitting and Cooperative Jamming,
    R. Chou, A. Yener
    Proc. of the IEEE International Symposium on Information Theory, ISIT’16, Barcelona, Spain, Jul. 2016.

  31. Using Deterministic Decisions for Low-Entropy Bits in the Encoding and Decoding of Polar Codes,
    R. Chou, M. Bloch
    Proc. of the 53rd Annual Allerton Conference on Communication, Control, and Computing, Allerton’15, Monticello, IL, Oct. 2015.

  32. Polar Coding for Empirical and Strong Coordination via Distribution Approximation,
    R. Chou, M. Bloch, J. Kliewer
    Proc. of the IEEE International Symposium on Information Theory, ISIT’15, Hong Kong, Jun. 2015.

  33. Lossless and Lossy Source Compression with Near-Uniform Output: Is Common Randomness Always Required?,
    B. Vellambi, M. Bloch, R. Chou, J. Kliewer
    Proc. of the IEEE International Symposium on Information Theory, ISIT’15, Hong Kong, Jun. 2015.

  34. Polar Coding for the Broadcast Channel with Confidential Messages,
    R. Chou, M. Bloch
    Proc. of the IEEE Information Theory Workshop, ITW’15, Jerusalem, Israel, Apr. 2015.

  35. Low-Complexity Channel Resolvability Codes for the Symmetric Multiple-Access Channel,
    R. Chou, M. Bloch, J. Kliewer
    Proc. of the IEEE Information Theory Workshop, ITW’14, Hobart, Tasmania, Nov. 2014.

  36. Uniform Distributed Source Coding for the Multiple Access Wiretap Channel,
    R. Chou, M. Bloch
    Proc. of the IEEE Conference on Communications and Network Security, CNS’14, San Francisco, CA, Oct. 2014.

  37. Secret-Key Generation with Arbitrarily Varying Eavesdropper's Channel,
    R. Chou, M. Bloch
    Proc. of the IEEE Global Conference on Signal and Information Processing, GlobalSIP’13, Austin, TX, Dec. 2013.

  38. Polar Coding for Secret-Key Generation,
    R. Chou, M. Bloch, E. Abbe
    Proc. of the IEEE Information Theory Workshop, ITW’13, Seville, Spain, Sep. 2013.

  39. Data Compression with Nearly Uniform Output,
    R. Chou, M. Bloch
    Proc. of the IEEE International Symposium on Information Theory, ISIT’13, Istanbul, Turkey, Jul. 2013.

  40. Experimental Aspects of Secret-Key Generation in Wireless Environments,
    A. Pierrot, R. Chou, M. Bloch
    Proc. of the IEEE International Workshop on Signal Processing Advances in Wireless Communications, SPAWC’13, Darmstadt, Germany, Jun. 2013.

  41. One-Way Rate-Limited Sequential Key-Distillation,
    R. Chou, M. Bloch
    Proc. of the IEEE International Symposium on Information Theory, ISIT’12, Cambridge, MA, Jul. 2012.

  42. Performance Evaluation for Particle Filters,
    R. Chou, Y. Boers, M. Podt, M. Geist
    Proc. of the 14th International Conference on Information Fusion, Fusion’11, Chicago, IL, Jul. 2011.