Name
Papers
Collaborators
RAFAEL F. SCHAEFER
95
66
Citations 
PageRank 
Referers 
165
35.85
264
Referees 
References 
567
725
Search Limit
100567
Title
Citations
PageRank
Year
Turing Meets Shannon: On the Algorithmic Construction of Channel-Aware Codes00.342022
Code Constructions and Bounds for Identification via Channels00.342022
Joint Active and Passive Secure Precoding in IRS-Aided MIMO Systems00.342021
A Reverse Jensen Inequality Result with Application to Mutual Information Estimation.00.342021
Reinforce Security: A Model-Free Approach Towards Secure Wiretap Coding00.342021
Securing Massive MIMO Systems: Secrecy for Free With Low-Complexity Architectures10.352021
Secure Communication and Identification Systems - Effective Performance Evaluation on Turing Machines.00.342020
Neural Mutual Information Estimation For Channel Coding: State-Of-The-Art Estimators, Analysis, And Performance Comparison00.342020
Shannon Meets Turing: Non-Computability And Non-Approximability Of The Finite State Channel Capacity00.342020
Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication00.342020
New Capacity Results for Fading Gaussian Multiuser Channels With Statistical CSIT00.342020
On the ϵ-Capacity of Finite Compound Channels with Applications to the Strong Converse and Second Order Coding Rate00.342020
Secure Transmission in IRS-Assisted MIMO Systems with Active Eavesdroppers20.352020
Secure Storage Capacity Under Rate Constraints - Continuity and Super Activation.00.342020
Low-complexity and Reliable Transforms for Physical Unclonable Functions00.342020
Deep learning based wiretap coding via mutual information estimation00.342020
On the Algorithmic Computability of Achievability and Converse - ϵ-Capacity of Compound Channels and Asymptotic Bounds of Error-Correcting Codes.00.342020
Deep Learning For Channel Coding Via Neural Mutual Information Estimation10.352019
On the Algorithmic Computability of the Secret Key and Authentication Capacity Under Channel, Storage, and Privacy Leakage Constraints.30.412019
Identification Capacity Of Correlation-Assisted Discrete Memoryless Channels: Analytical Properties And Representations00.342019
Copulas and Multi-User Channel Orders00.342019
Detectability Of Denial-Of-Service Attacks On Communication Systems00.342019
Resource Allocation for Secure Communication Systems: Algorithmic Solvability00.342019
On Stochastic Orders And Fading Gaussian Multi-User Channels With Statistical Csit00.342019
On D2d Caching With Uncoded Cache Placement00.342019
On the Structure of the Capacity Formula for General Finite State Channels with Applications10.372019
Coding for Non-IID Sources and Channels: Entropic Approximations and a Question of Ahlswede20.392019
Secure Regularized Zero Forcing For Multiuser Mimome Channels00.342019
On the Optimality of D2D Coded Caching With Uncoded Cache Placement and One-Shot Delivery80.652019
Turing Meets Shannon - On the Algorithmic Computability of the Capacities of Secure Communication Systems (Invited Paper).00.342019
Joint User Selection And Precoding In Multiuser Mimo Systems Via Group Lasso00.342019
Private Authentication with Physical Identifiers Through Broadcast Channel Measurements00.342019
On The Computability Of The Secret Key Capacity Under Rate Constraints00.342019
Secrecy Capacity Under List Decoding For A Channel with A Passive Eavesdropper and an Active Jammer.00.342018
Full-Duplex Relaying with Improper Gaussian Signaling over Nakagami-m Fading Channels.40.392018
Controllable Identifier Measurements for Private Authentication With Secret Keys.10.352018
Privacy Amplification: Recent Developments and Applications00.342018
Performance Evaluation of Secure Communication Systems on Turing Machines00.342018
Iterative Antenna Selection for Secrecy Enhancement in Massive MIMO Wiretap Channels.00.342018
The Deterministic and Correlated Random Public-Confidential Capacity Regions of the Arbitrarily Varying Wiretap Channel00.342018
Deep Learning for the Gaussian Wiretap Channel10.362018
Identification over Channels with Feedback: Discontinuity Behavior and Super-Activation10.352018
Strong Secrecy for Interference Channels Based on Channel Resolvability.10.352018
Secure Broadcasting Using Independent Secret Keys.20.362018
Secure Communication in Spectrum-Sharing Massive MIMO Systems With Active Eavesdropping.50.392018
On Robustness of Massive MIMO Systems Against Passive Eavesdropping under Antenna Selection.00.342018
Analytical Properties of Shannon's Capacity of Arbitrarily Varying Channels under List Decoding: Super-Additivity and Discontinuity Behavior.00.342018
Optimal Transmit Antenna Selection for Massive MIMO Wiretap Channels.30.402018
Secure and Reliable Key Agreement with Physical Unclonable Functions.00.342018
Secret-Key Generation and Convexity of the Rate Region Using Infinite Compound Sources.10.352018
  • 1
  • 2