A second-order achievable rate region for Gaussian multi-access channels via a central limit theorem for functions E MolavianJazi, JN Laneman IEEE Transactions on Information Theory 61 (12), 6719-6733, 2015 | 110* | 2015 |
Arbitrary jamming can preclude secure communication E MolavianJazi, M Bloch, JN Laneman 2009 47th Annual Allerton Conference on Communication, Control, and …, 2009 | 74 | 2009 |
Simpler achievable rate regions for multiaccess with finite blocklength EM Jazi, JN Laneman 2012 IEEE International Symposium on Information Theory Proceedings, 36-40, 2012 | 42* | 2012 |
A unified approach to Gaussian channels with finite blocklength E MolavianJazi University of Notre Dame, 2014 | 34 | 2014 |
A random coding approach to Gaussian multiple access channels with finite blocklength E MolavianJazi, JN Laneman 2012 50th Annual Allerton Conference on Communication, Control, and …, 2012 | 28 | 2012 |
Secure communications over arbitrarily varying wiretap channels E MolavianJazi University of Notre Dame, 2009 | 21 | 2009 |
On the second-order coding rate of non-ergodic fading channels E MolavianJazi, JN Laneman 2013 51st Annual Allerton Conference on Communication, Control, and …, 2013 | 19* | 2013 |
On the second-order cost of TDMA for Gaussian multiple access E MolavianJazi, JN Laneman 2014 IEEE International Symposium on Information Theory, 266-270, 2014 | 11 | 2014 |
Low-latency communications over zero-battery energy harvesting channels E MolavianJazi, A Yener 2015 IEEE Global Communications Conference (GLOBECOM), 1-6, 2015 | 9 | 2015 |
Multiaccess communication in the finite blocklength regime E MolavianJazi, JN Laneman Information Theory and Applications Workshop (ITA), 2012 | 9 | 2012 |
A comparison of some audio watermarking methods EK Marnani, Z Karami, E MolavianJazi 2009 6th International Conference on Electrical Engineering, Computing …, 2009 | 7 | 2009 |
Remote source coding with two-sided information B Guler, E MolavianJazi, A Yener 2015 IEEE International Symposium on Information Theory (ISIT), 2176-2180, 2015 | 6 | 2015 |
Analysis of randomness of runs and its application for statistical tests M Dakhilalian, EM Jazi, MJ Taghiyar, N Security International Journal of Computer Science and Network Security 9 (9), 83-90, 2009 | 4 | 2009 |
Coded modulation for Gaussian channels: Dispersion-and entropy-limited regimes EM Jazi, JN Laneman 2015 IEEE Wireless Communications and Networking Conference (WCNC), 528-533, 2015 | 3 | 2015 |
Interactive Function Compression with Asymmetric Priors B Guler, A Yener, E MolavianJazi, P Basu, A Swami, C Andersen Data Compression Conference (DCC), 2016 | 2 | 2016 |
Subset source coding E MolavianJazi, A Yener IEEE Transactions on Information Theory 64 (9), 5989-6012, 2018 | 1 | 2018 |
Power control configuration for uplink transmissions VN E MolavianJazi, H Jung US Patent US10660044B2, 2020 | | 2020 |
Two-way lossy compression via a relay with self source E MolavianJazi, A Yener 2016 IEEE International Symposium on Information Theory (ISIT), 150-154, 2016 | | 2016 |
Lossy Subset Source Coding E MolavianJazi, A Yener ITA Workshop, San Diego, CA, 2016 | | 2016 |
Protocols for efficient inference communication C Andersen, P Basu, B Guler, A Yener, E Molavianjazi 2015 IEEE International Conference on Pervasive Computing and Communication …, 2015 | | 2015 |