Follow
Boulat Bash
Boulat Bash
Associate Professor, ECE Department, University of Arizona
Verified email at email.arizona.edu - Homepage
Title
Cited by
Cited by
Year
Limits of reliable communication with low probability of detection on AWGN channels
BA Bash, D Goeckel, D Towsley
IEEE Journal on Selected Areas in Communications 31 (9), 1921-1930, 2013
8122013
Covert communication in the presence of an uninformed jammer
TV Sobers, BA Bash, S Guha, D Towsley, D Goeckel
IEEE Transactions on Wireless Communications 16 (9), 6193-6206, 2017
3832017
Hiding information in noise: Fundamental limits of covert wireless communication
BA Bash, D Goeckel, D Towsley, S Guha
IEEE Communications Magazine 53 (12), 26-31, 2015
3422015
Covert wireless communication with artificial noise generation
R Soltani, D Goeckel, D Towsley, B Bash, S Guha
IEEE Transactions on Wireless Communications, 2018
1702018
Covert communications when the warden does not know the background noise power
D Goeckel, B Bash, S Guha, D Towsley
IEEE Communications Letters 20 (2), 236-239, 2015
1432015
Covert Communication Gains from Adversary's Ignorance of Transmission Time
B Bash, D Goeckel, D Towsley
IEEE Transactions on Wireless Communications, 2016
1382016
Quantum-secure covert communication on bosonic channels
BA Bash, AH Gheorghe, M Patel, JL Habif, D Goeckel, D Towsley, S Guha
Nature communications 6, 8626, 2015
1192015
Exact distributed Voronoi cell computation in sensor networks
BA Bash, PJ Desnoyers
Proceedings of the 6th international conference on Information processing in …, 2007
1142007
Square root law for communication with low probability of detection on AWGN channels
BA Bash, D Goeckel, D Towsley
2012 IEEE International Symposium on Information Theory Proceedings, 448-452, 2012
1102012
LPD communication when the warden does not know when
BA Bash, D Goeckel, D Towsley
2014 IEEE International Symposium on Information Theory, 606-610, 2014
942014
Multi-hop routing in covert wireless networks
A Sheikholeslami, M Ghaderi, D Towsley, BA Bash, S Guha, D Goeckel
IEEE Transactions on Wireless Communications 17 (6), 3656-3669, 2018
792018
Approximately uniform random sampling in sensor networks
BA Bash, JW Byers, J Considine
Proceeedings of the 1st international workshop on Data management for sensor …, 2004
712004
Covert single-hop communication in a wireless network with distributed artificial noise generation
R Soltani, B Bash, D Goeckel, S Guha, D Towsley
2014 52nd Annual Allerton Conference on communication, control, and …, 2014
572014
Covert communication over classical-quantum channels
A Sheikholeslami, BA Bash, D Towsley, D Goeckel, S Guha
2016 IEEE International Symposium on Information Theory (ISIT), 2064-2068, 2016
502016
Fundamental limits of quantum-secure covert communication over bosonic channels
MS Bullock, CN Gagatsos, S Guha, BA Bash
IEEE Journal on Selected Areas in Communications 38 (3), 471-482, 2020
412020
Covert communication with the help of an uninformed jammer achieves positive rate
TV Sobers, BA Bash, D Goeckel, S Guha, D Towsley
2015 49th Asilomar Conference on Signals, Systems and Computers, 625-629, 2015
382015
Infinite-fold enhancement in communications capacity using pre-shared entanglement
S Guha, Q Zhuang, BA Bash
2020 IEEE International Symposium on Information Theory (ISIT), 1835-1839, 2020
312020
Covert Capacity of Bosonic Channels
CN Gagatsos, MS Bullock, BA Bash
IEEE Journal on Selected Areas in Information Theory 1 (2), 555-567, 2020
282020
Demonstration of Entanglement-Enhanced Covert Sensing
S Hao, H Shi, CN Gagatsos, M Mishra, B Bash, I Djordjevic, S Guha, ...
Physical Review Letters 129 (1), 010501, 2022
262022
Post-IPO Flipping and Turnover: Predictive Factors for Long-Run Returns
B Bash
Available at SSRN 620164, 2001
242001
The system can't perform the operation now. Try again later.
Articles 1–20