A simple cooperative diversity method based on network path selection A Bletsas, A Khisti, DP Reed, A Lippman IEEE Journal on selected areas in communications 24 (3), 659-672, 2006 | 3739 | 2006 |
Secure transmission with multiple antennas—Part I: The MISOME wiretap channel A Khisti, W G IEEE Transactions on Information Theory 56 (7), 3088-3104, 2010 | 1801 | 2010 |
Secure transmission with multiple antennas I: The MISOME wiretap channel A Khisti, GW Wornell Information Theory, IEEE Transactions on 56 (7), 3088-3104, 2010 | 1801* | 2010 |
A survey of physical layer security techniques for 5G wireless networks and challenges ahead Y Wu, A Khisti, C Xiao, G Caire, KK Wong, X Gao IEEE Journal on Selected Areas in Communications 36 (4), 679-695, 2018 | 824 | 2018 |
Secure broadcasting over fading channels A Khisti, A Tchamkerten, GW Wornell IEEE transactions on information theory 54 (6), 2453-2469, 2008 | 298 | 2008 |
On the Gaussian MIMO wiretap channel A Khisti, G Wornell, A Wiesel, Y Eldar 2007 IEEE International Symposium on Information Theory, 2471-2475, 2007 | 259 | 2007 |
QoE-driven cache management for HTTP adaptive bit rate streaming over wireless networks W Zhang, Y Wen, Z Chen, A Khisti IEEE transactions on multimedia 15 (6), 1431-1445, 2013 | 244 | 2013 |
Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage D Varodayan, A Khisti 2011 IEEE International Conference on Acoustics, Speech and Signal …, 2011 | 197 | 2011 |
Lattice strategies for the dirty multiple access channel T Philosof, R Zamir, U Erez, AJ Khisti IEEE Transactions on Information Theory 57 (8), 5006-5035, 2011 | 158 | 2011 |
Information-theoretic generalization bounds for SGLD via data-dependent estimates J Negrea, M Haghifam, GK Dziugaite, A Khisti, DM Roy Advances in Neural Information Processing Systems 32, 2019 | 154 | 2019 |
Using distributed source coding to secure fingerprint biometrics SC Draper, A Khisti, E Martinian, A Vetro, JS Yedidia 2007 IEEE International Conference on Acoustics, Speech and Signal …, 2007 | 146 | 2007 |
Biometric based user authentication and data encryption SC Draper, A Khisti, E Martinian, A Vetro, JS Yedidia US Patent 7,779,268, 2010 | 140 | 2010 |
Variational model inversion attacks KC Wang, Y Fu, K Li, A Khisti, R Zemel, A Makhzani Advances in Neural Information Processing Systems 34, 9706-9719, 2021 | 122 | 2021 |
Opportunistic cooperative diversity with feedback and cheap radios A Bletsas, A Khisti, MZ Win IEEE Transactions on Wireless Communications 7 (5), 1823-1827, 2008 | 119 | 2008 |
The MIMOME channel A Khisti, G Wornell arXiv preprint arXiv:0710.1325, 2007 | 116 | 2007 |
Sharpened generalization bounds based on conditional mutual information and an application to noisy, iterative algorithms M Haghifam, J Negrea, A Khisti, DM Roy, GK Dziugaite Advances in Neural Information Processing Systems 33, 9925-9935, 2020 | 115 | 2020 |
Layered constructions for low-delay streaming codes A Badr, P Patil, A Khisti, WT Tan, J Apostolopoulos IEEE Transactions on Information Theory 63 (1), 111-141, 2016 | 109 | 2016 |
Interference alignment for the multiantenna compound wiretap channel A Khisti IEEE Transactions on Information Theory 57 (5), 2976-2993, 2011 | 83 | 2011 |
Secret-key generation using correlated sources and channels A Khisti, SN Diggavi, GW Wornell IEEE Transactions on Information Theory 58 (2), 652-670, 2012 | 76 | 2012 |
A simple cooperative diversity method based on network path selection A Blestas, A Khisti, DP Reed, A Lippman IEEE J. Sel. Areas Commun 24 (3), 659-672, 2006 | 75 | 2006 |