Codes Against Online Adversaries: Large Alphabets

@article{Dey2013CodesAO,
  title={Codes Against Online Adversaries: Large Alphabets},
  author={Bikash Kumar Dey and Sidharth Jaggi and Michael Langberg},
  journal={IEEE Transactions on Information Theory},
  year={2013},
  volume={59},
  pages={3304-3316}
}
In this paper, we consider the communication of information in the presence of an online adversarial jammer. In the setting under study, a sender wishes to communicate a message to a receiver by transmitting a codeword <b>x</b>=(<i>x</i><sub>1</sub>,...,<i>x</i><sub>n</sub>) symbol-by-symbol over a communication channel. The adversarial jammer can view the transmitted symbols <i>x</i><sub>i</sub> one at a time and can change up to a <i>p</i>-fraction of them. However, for each symbol <i>x</i… CONTINUE READING

Citations

Publications citing this paper.
Showing 1-10 of 11 extracted citations

Causal Erasure Channels

View 3 Excerpts
Highly Influenced

Network Error Correction Coding for Time-Varying Adversarial Errors in a Unicast Network

2018 IEEE International Symposium on Information Theory (ISIT) • 2018
View 1 Excerpt

Coding for the Large-Alphabet Adversarial Channel

IEEE Transactions on Information Theory • 2017
View 2 Excerpts

The capacity of online (causal) q-ary error-erasure channels

2016 IEEE International Symposium on Information Theory (ISIT) • 2016
View 3 Excerpts

Reliable and secure communication over adversarial multipath networks: A survey

2015 10th International Conference on Information, Communications and Signal Processing (ICICS) • 2015
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-10 of 20 references

Information Theory: Coding Theorems for Discrete Memoryless Systems, 2nd ed

I. Csiszár, J. Korner
1997
View 4 Excerpts
Highly Influenced

Encoding and error-correction procedures for the Bose-Chaudhuri codes

IRE Trans. Information Theory • 1960
View 3 Excerpts
Highly Influenced

The capacities of certain channel classes under random coding

D. Blackwell, L. Breiman, A. J. Thomasian
Ann. Math. Statist., vol. 31, no. 3, pp. 558–567, 1960. • 1960
View 4 Excerpts
Highly Influenced

Coding against delayed adversaries

2010 IEEE International Symposium on Information Theory • 2010
View 7 Excerpts

Binary causal-adversary channels

2009 IEEE International Symposium on Information Theory • 2009
View 7 Excerpts

Codes against online adversaries

2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton) • 2009
View 1 Excerpt

Adversarial models and resilient schemes for network coding

2008 IEEE International Symposium on Information Theory • 2008
View 1 Excerpt

Similar Papers

Loading similar papers…