Follow
Boulat Bash
Boulat Bash
Assistant Professor, ECE Department, University of Arizona
Verified email at email.arizona.edu - Homepage
Title
Cited by
Cited by
Year
Limits of reliable communication with low probability of detection on AWGN channels
BA Bash, D Goeckel, D Towsley
IEEE Journal on Selected Areas in Communications 31 (9), 1921-1930, 2013
7332013
Covert communication in the presence of an uninformed jammer
TV Sobers, BA Bash, S Guha, D Towsley, D Goeckel
IEEE Transactions on Wireless Communications 16 (9), 6193-6206, 2017
3482017
Hiding information in noise: Fundamental limits of covert wireless communication
BA Bash, D Goeckel, D Towsley, S Guha
IEEE Communications Magazine 53 (12), 26-31, 2015
3182015
Covert wireless communication with artificial noise generation
R Soltani, D Goeckel, D Towsley, B Bash, S Guha
IEEE Transactions on Wireless Communications, 2018
1592018
Covert communications when the warden does not know the background noise power
D Goeckel, B Bash, S Guha, D Towsley
IEEE Communications Letters 20 (2), 236-239, 2015
1352015
Covert Communication Gains from Adversary's Ignorance of Transmission Time
B Bash, D Goeckel, D Towsley
IEEE Transactions on Wireless Communications, 2016
1282016
Exact distributed Voronoi cell computation in sensor networks
BA Bash, PJ Desnoyers
Proceedings of the 6th international conference on Information processing in …, 2007
1122007
Quantum-secure covert communication on bosonic channels
BA Bash, AH Gheorghe, M Patel, JL Habif, D Goeckel, D Towsley, S Guha
Nature communications 6, 8626, 2015
1102015
Square root law for communication with low probability of detection on AWGN channels
BA Bash, D Goeckel, D Towsley
2012 IEEE International Symposium on Information Theory Proceedings, 448-452, 2012
1062012
LPD communication when the warden does not know when
BA Bash, D Goeckel, D Towsley
2014 IEEE International Symposium on Information Theory, 606-610, 2014
902014
Multi-hop routing in covert wireless networks
A Sheikholeslami, M Ghaderi, D Towsley, BA Bash, S Guha, D Goeckel
IEEE Transactions on Wireless Communications 17 (6), 3656-3669, 2018
752018
Approximately uniform random sampling in sensor networks
BA Bash, JW Byers, J Considine
Proceeedings of the 1st international workshop on Data management for sensor …, 2004
712004
Covert single-hop communication in a wireless network with distributed artificial noise generation
R Soltani, B Bash, D Goeckel, S Guha, D Towsley
2014 52nd Annual Allerton Conference on communication, control, and …, 2014
572014
Covert communication over classical-quantum channels
A Sheikholeslami, BA Bash, D Towsley, D Goeckel, S Guha
2016 IEEE International Symposium on Information Theory (ISIT), 2064-2068, 2016
462016
Covert communication with the help of an uninformed jammer achieves positive rate
TV Sobers, BA Bash, D Goeckel, S Guha, D Towsley
2015 49th Asilomar Conference on Signals, Systems and Computers, 625-629, 2015
372015
Fundamental limits of quantum-secure covert communication over bosonic channels
MS Bullock, CN Gagatsos, S Guha, BA Bash
IEEE Journal on Selected Areas in Communications 38 (3), 471-482, 2020
352020
Infinite-fold enhancement in communications capacity using pre-shared entanglement
S Guha, Q Zhuang, BA Bash
2020 IEEE International Symposium on Information Theory (ISIT), 1835-1839, 2020
272020
Covert Capacity of Bosonic Channels
CN Gagatsos, MS Bullock, BA Bash
IEEE Journal on Selected Areas in Information Theory 1 (2), 555-567, 2020
232020
Post-IPO Flipping and Turnover: Predictive Factors for Long-Run Returns
B Bash
Available at SSRN 620164, 2001
232001
Quantum noise limited optical communication with low probability of detection
BA Bash, S Guha, D Goeckel, D Towsley
2013 IEEE International Symposium on Information Theory, 1715-1719, 2013
212013
The system can't perform the operation now. Try again later.
Articles 1–20