{"id":"https://openalex.org/W3153862035","doi":"https://doi.org/10.1109/isit45174.2021.9517968","title":"Stochastic-Adversarial Channels: Online Adversaries With Feedback Snooping","display_name":"Stochastic-Adversarial Channels: Online Adversaries With Feedback Snooping","publication_year":2021,"publication_date":"2021-07-12","ids":{"openalex":"https://openalex.org/W3153862035","doi":"https://doi.org/10.1109/isit45174.2021.9517968","mag":"3153862035"},"language":"en","primary_location":{"id":"doi:10.1109/isit45174.2021.9517968","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit45174.2021.9517968","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2104.07194","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058971371","display_name":"Vinayak Suresh","orcid":"https://orcid.org/0000-0001-7942-5789"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Vinayak Suresh","raw_affiliation_strings":["Purdue University,School of Electrical and Computer Engineering","PURDUE UNIVERSITY"],"affiliations":[{"raw_affiliation_string":"Purdue University,School of Electrical and Computer Engineering","institution_ids":[]},{"raw_affiliation_string":"PURDUE UNIVERSITY","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059178661","display_name":"Eric Ruzomberka","orcid":"https://orcid.org/0000-0002-3817-6584"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Eric Ruzomberka","raw_affiliation_strings":["Purdue University,School of Electrical and Computer Engineering","PURDUE UNIVERSITY"],"affiliations":[{"raw_affiliation_string":"Purdue University,School of Electrical and Computer Engineering","institution_ids":[]},{"raw_affiliation_string":"PURDUE UNIVERSITY","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001355478","display_name":"David J. Love","orcid":"https://orcid.org/0000-0001-5922-4787"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David J. Love","raw_affiliation_strings":["Purdue University,School of Electrical and Computer Engineering","PURDUE UNIVERSITY"],"affiliations":[{"raw_affiliation_string":"Purdue University,School of Electrical and Computer Engineering","institution_ids":[]},{"raw_affiliation_string":"PURDUE UNIVERSITY","institution_ids":["https://openalex.org/I219193219"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5058971371"],"corresponding_institution_ids":["https://openalex.org/I219193219"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.03051894,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"497","last_page":"502"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6884281039237976},{"id":"https://openalex.org/keywords/converse","display_name":"Converse","score":0.682620644569397},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.6116429567337036},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5574743151664734},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5359843969345093},{"id":"https://openalex.org/keywords/codebook","display_name":"Codebook","score":0.5282285213470459},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.5199088454246521},{"id":"https://openalex.org/keywords/code-word","display_name":"Code word","score":0.5187376141548157},{"id":"https://openalex.org/keywords/binary-erasure-channel","display_name":"Binary erasure channel","score":0.4759114384651184},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4672268331050873},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.46691539883613586},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.43643486499786377},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.4199996292591095},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.34779104590415955},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.33169156312942505},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2558099627494812},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18205925822257996},{"id":"https://openalex.org/keywords/channel-capacity","display_name":"Channel capacity","score":0.17646414041519165},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.10035517811775208},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08982238173484802}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6884281039237976},{"id":"https://openalex.org/C2776809875","wikidata":"https://www.wikidata.org/wiki/Q1375963","display_name":"Converse","level":2,"score":0.682620644569397},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.6116429567337036},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5574743151664734},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5359843969345093},{"id":"https://openalex.org/C127759330","wikidata":"https://www.wikidata.org/wiki/Q637416","display_name":"Codebook","level":2,"score":0.5282285213470459},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.5199088454246521},{"id":"https://openalex.org/C153207627","wikidata":"https://www.wikidata.org/wiki/Q863873","display_name":"Code word","level":3,"score":0.5187376141548157},{"id":"https://openalex.org/C149862233","wikidata":"https://www.wikidata.org/wiki/Q864142","display_name":"Binary erasure channel","level":4,"score":0.4759114384651184},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4672268331050873},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.46691539883613586},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.43643486499786377},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.4199996292591095},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.34779104590415955},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.33169156312942505},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2558099627494812},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18205925822257996},{"id":"https://openalex.org/C97744766","wikidata":"https://www.wikidata.org/wiki/Q870845","display_name":"Channel capacity","level":3,"score":0.17646414041519165},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.10035517811775208},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08982238173484802},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/isit45174.2021.9517968","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit45174.2021.9517968","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2104.07194","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2104.07194","pdf_url":"https://arxiv.org/pdf/2104.07194","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"mag:3153862035","is_oa":true,"landing_page_url":"https://arxiv.org/pdf/2104.07194.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"doi:10.48550/arxiv.2104.07194","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2104.07194","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2104.07194","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2104.07194","pdf_url":"https://arxiv.org/pdf/2104.07194","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5497576532","display_name":null,"funder_award_id":"CNS1642982,CCF1816013,EEC1941529","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3153862035.pdf","grobid_xml":"https://content.openalex.org/works/W3153862035.grobid-xml"},"referenced_works_count":22,"referenced_works":["https://openalex.org/W1524159887","https://openalex.org/W1529178725","https://openalex.org/W1549664537","https://openalex.org/W1978948309","https://openalex.org/W1990514974","https://openalex.org/W2013841965","https://openalex.org/W2098082625","https://openalex.org/W2137267299","https://openalex.org/W2138129780","https://openalex.org/W2155979661","https://openalex.org/W2468385132","https://openalex.org/W2517554431","https://openalex.org/W2912210351","https://openalex.org/W2946556807","https://openalex.org/W2951262303","https://openalex.org/W2962872759","https://openalex.org/W2963133100","https://openalex.org/W2963628132","https://openalex.org/W2975286556","https://openalex.org/W3105388109","https://openalex.org/W4302366875","https://openalex.org/W6768479894"],"related_works":["https://openalex.org/W3198585495","https://openalex.org/W1618774954","https://openalex.org/W2799841412","https://openalex.org/W1957992270","https://openalex.org/W3105388109","https://openalex.org/W2012991212","https://openalex.org/W2137267299","https://openalex.org/W2743418346","https://openalex.org/W2761953145","https://openalex.org/W3104141042","https://openalex.org/W2910309170","https://openalex.org/W2951753183","https://openalex.org/W3214519225","https://openalex.org/W3016114141","https://openalex.org/W1673670404","https://openalex.org/W2950416354","https://openalex.org/W2963658073","https://openalex.org/W2950813531","https://openalex.org/W3198642725","https://openalex.org/W2069538225"],"abstract_inverted_index":{"The":[0],"growing":[1],"need":[2],"for":[3],"reliable":[4],"communication":[5],"over":[6,76],"untrusted":[7],"networks":[8],"has":[9,119],"caused":[10],"a":[11,36,64,72,77,102,133],"renewed":[12],"interest":[13],"in":[14,87],"adversarial":[15],"channel":[16,26,80,85],"models,":[17],"which":[18],"often":[19],"behave":[20],"much":[21],"differently":[22],"than":[23],"traditional":[24],"stochastic":[25],"models.":[27,59],"Of":[28],"particular":[29],"practical":[30],"use":[31],"is":[32,42],"the":[33,48,61,88,108,111,115],"assumption":[34],"of":[35,47,90,105,110],"causal":[37,45,121],"or":[38,82,98],"online":[39,92],"adversary":[40,93],"who":[41,95],"limited":[43],"to":[44,69,101,123],"knowledge":[46],"transmitted":[49],"codeword.":[50],"In":[51,60],"this":[52],"work,":[53],"we":[54,131,144],"consider":[55],"stochastic-adversarial":[56],"mixed":[57],"noise":[58],"setup":[62],"considered,":[63],"transmit":[65],"node":[66,74],"(Alice)":[67],"attempts":[68],"communicate":[70],"with":[71,137],"receive":[73],"(Bob)":[75],"binary":[78,83],"erasure":[79],"(BEC)":[81],"symmetric":[84],"(BSC)":[86],"presence":[89],"an":[91],"(Calvin)":[94],"can":[96],"erase":[97],"flip":[99],"up":[100],"certain":[103],"number":[104],"bits":[106],"at":[107],"input":[109],"channel.":[112],"Calvin":[113],"knows":[114],"encoding":[116],"scheme":[117],"and":[118,138,147],"strict":[120],"access":[122],"Bob's":[124],"reception":[125],"through":[126],"feedback":[127],"snooping.":[128],"For":[129,142],"erasures,":[130],"provide":[132,145],"complete":[134],"capacity":[135],"characterization":[136],"without":[139],"transmitter":[140],"feedback.":[141],"bit-flips,":[143],"converse":[146],"achievability":[148],"bounds.":[149]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
