{"id":"https://openalex.org/W1948599384","doi":"https://doi.org/10.1109/tit.2015.2503766","title":"A Model for Adversarial Wiretap Channels","display_name":"A Model for Adversarial Wiretap Channels","publication_year":2015,"publication_date":"2015-11-25","ids":{"openalex":"https://openalex.org/W1948599384","doi":"https://doi.org/10.1109/tit.2015.2503766","mag":"1948599384"},"language":"en","primary_location":{"id":"doi:10.1109/tit.2015.2503766","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2015.2503766","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100614749","display_name":"Peng\u2010Wei Wang","orcid":"https://orcid.org/0000-0002-6224-8920"},"institutions":[{"id":"https://openalex.org/I168635309","display_name":"University of Calgary","ror":"https://ror.org/03yjb2x39","country_code":"CA","type":"education","lineage":["https://openalex.org/I168635309"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Pengwei Wang","raw_affiliation_strings":["Department of Computer Science, University of Calgary, Calgary, AB, Canada","Department of Computer Science University of Calgary Calgary, AB, Canada#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Calgary, Calgary, AB, Canada","institution_ids":["https://openalex.org/I168635309"]},{"raw_affiliation_string":"Department of Computer Science University of Calgary Calgary, AB, Canada#TAB#","institution_ids":["https://openalex.org/I168635309"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010447902","display_name":"Reihaneh Safavi\u2013Naini","orcid":"https://orcid.org/0000-0002-1697-3590"},"institutions":[{"id":"https://openalex.org/I168635309","display_name":"University of Calgary","ror":"https://ror.org/03yjb2x39","country_code":"CA","type":"education","lineage":["https://openalex.org/I168635309"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Reihaneh Safavi-Naini","raw_affiliation_strings":["Department of Computer Science, University of Calgary, Calgary, AB, Canada","Department of Computer Science University of Calgary Calgary, AB, Canada#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Calgary, Calgary, AB, Canada","institution_ids":["https://openalex.org/I168635309"]},{"raw_affiliation_string":"Department of Computer Science University of Calgary Calgary, AB, Canada#TAB#","institution_ids":["https://openalex.org/I168635309"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100614749"],"corresponding_institution_ids":["https://openalex.org/I168635309"],"apc_list":null,"apc_paid":null,"fwci":2.9593,"has_fulltext":false,"cited_by_count":34,"citation_normalized_percentile":{"value":0.91569325,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"62","issue":"2","first_page":"970","last_page":"983"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9882000088691711,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.7024006843566895},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6605537533760071},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.6084168553352356},{"id":"https://openalex.org/keywords/code-word","display_name":"Code word","score":0.5666715502738953},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5530998706817627},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5371564030647278},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.4757799208164215},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4292777180671692},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.41051164269447327},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.29816219210624695},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.28830230236053467},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2850534915924072},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.2842177450656891},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.2525831460952759},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.25123268365859985}],"concepts":[{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.7024006843566895},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6605537533760071},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.6084168553352356},{"id":"https://openalex.org/C153207627","wikidata":"https://www.wikidata.org/wiki/Q863873","display_name":"Code word","level":3,"score":0.5666715502738953},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5530998706817627},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5371564030647278},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.4757799208164215},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4292777180671692},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.41051164269447327},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.29816219210624695},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.28830230236053467},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2850534915924072},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.2842177450656891},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.2525831460952759},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.25123268365859985},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tit.2015.2503766","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2015.2503766","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320319907","display_name":"Alberta Innovates - Technology Futures","ror":"https://ror.org/00ynafe15"},{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":62,"referenced_works":["https://openalex.org/W52732363","https://openalex.org/W60616127","https://openalex.org/W182801106","https://openalex.org/W252932944","https://openalex.org/W949353694","https://openalex.org/W1490273987","https://openalex.org/W1492657530","https://openalex.org/W1524382113","https://openalex.org/W1526970571","https://openalex.org/W1562334123","https://openalex.org/W1580365030","https://openalex.org/W1583871653","https://openalex.org/W1585844421","https://openalex.org/W1743965195","https://openalex.org/W1874069312","https://openalex.org/W1875021344","https://openalex.org/W1964378537","https://openalex.org/W1971485486","https://openalex.org/W1982581119","https://openalex.org/W1989102762","https://openalex.org/W1994481523","https://openalex.org/W1995875735","https://openalex.org/W2027174613","https://openalex.org/W2028732372","https://openalex.org/W2039957003","https://openalex.org/W2043769961","https://openalex.org/W2052755788","https://openalex.org/W2070616660","https://openalex.org/W2079364662","https://openalex.org/W2090072512","https://openalex.org/W2092148937","https://openalex.org/W2097079400","https://openalex.org/W2104172035","https://openalex.org/W2106215079","https://openalex.org/W2115321613","https://openalex.org/W2123658733","https://openalex.org/W2125835953","https://openalex.org/W2128153585","https://openalex.org/W2137072047","https://openalex.org/W2138129780","https://openalex.org/W2139194398","https://openalex.org/W2144007657","https://openalex.org/W2147549456","https://openalex.org/W2148024839","https://openalex.org/W2156214717","https://openalex.org/W2156690269","https://openalex.org/W2159247478","https://openalex.org/W2166080510","https://openalex.org/W2176748244","https://openalex.org/W2211831180","https://openalex.org/W2478708596","https://openalex.org/W2963230393","https://openalex.org/W3104341411","https://openalex.org/W3123299285","https://openalex.org/W4293702014","https://openalex.org/W6602478346","https://openalex.org/W6607508979","https://openalex.org/W6631478938","https://openalex.org/W6637795166","https://openalex.org/W6639227257","https://openalex.org/W6668233675","https://openalex.org/W6674657379"],"related_works":["https://openalex.org/W4387918499","https://openalex.org/W2772112465","https://openalex.org/W4386360526","https://openalex.org/W2368710903","https://openalex.org/W2158905603","https://openalex.org/W2766105476","https://openalex.org/W2735171729","https://openalex.org/W2895235410","https://openalex.org/W251429526","https://openalex.org/W2304380675"],"abstract_inverted_index":{"In":[0],"the":[1,33,123,146,159,181,216,221,265,270],"wiretap":[2,63,71,86,238],"model":[3,40,53,64,231],"of":[4,106,125,150,163,183,204,224,236,273],"secure":[5,207,254],"communication,":[6],"Alice":[7],"is":[8,17,23,232,244],"connected":[9],"to":[10,24,157,248,285],"Bob":[11],"over":[12,141],"a":[13,51,62,75,91,100,107,205,233,249,262],"noisy":[14],"channel":[15],"that":[16,32,113,214],"eavesdropped":[18],"by":[19],"Eve.":[20],"The":[21,39,110],"goal":[22],"provide":[25,135],"(asymptotic)":[26],"reliability":[27,138,149,162],"and":[28,68,98,122,127,137,148,153,161,240,288],"perfect":[29],"secrecy":[30,136,222],"assuming":[31],"Eve":[34],"has":[35,41,170],"unlimited":[36],"computational":[37],"power.":[38],"attracted":[42],"considerable":[43],"attention":[44],"in":[45,57,261],"recent":[46],"years":[47],"because":[48],"it":[49,243],"provides":[50],"natural":[52,234],"for":[54,139,165,186,227,291],"passive":[55],"eavesdropping":[56],"wireless":[58],"communication.":[59],"We":[60,144,278],"consider":[61],"with":[65,211],"active":[66],"adversaries,":[67],"define":[69,145],"adversarial":[70],"(AWTP)":[72],"channels":[73,152,226],"using":[74],"(\u03c1":[76,187],"<sub":[77,82,94,103,188,193],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[78,83,95,104,189,194],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">r</sub>":[79,96,190],",":[80,97,191],"\u03c1":[81,93,102,192],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">w</sub>":[84,105,195],")":[85],"adversary":[87],"who":[88],"can":[89,118],"read":[90,115,126],"fraction":[92,101],"modify":[99],"sent":[108],"codeword.":[109],"code":[111,209],"components":[112,129],"are":[114],"and/or":[116],"modified":[117,128],"be":[119,131],"chosen":[120],"adaptively,":[121],"subsets":[124],"could":[130],"different.":[132],"AWTP":[133,142,151,184,208,225,230],"codes":[134,164,185],"communication":[140],"channels.":[143,167,197],"security":[147,160],"use":[154],"these":[155,166],"definitions":[156],"evaluate":[158],"This":[168,258],"paper":[169],"two":[171],"main":[172],"contributions.":[173],"First,":[174],"we":[175,199],"prove":[176],"an":[177,201],"upper":[178],"bound":[179,217,268],"on":[180,269],"rate":[182,272],")-AWTP":[196],"Second,":[198],"give":[200,282],"explicit":[202],"construction":[203],"perfectly":[206],"family":[210],"efficient":[212],"decoding":[213],"achieves":[215],"and,":[218],"hence,":[219],"obtain":[220],"capacity":[223],"large":[228],"alphabets.":[229],"extension":[235],"Wyner's":[237],"models,":[239],"somewhat":[241],"surprisingly,":[242],"also":[245],"closely":[246],"related":[247],"seemingly":[250],"unrelated":[251],"cryptographic":[252],"primitive,":[253],"message":[255],"transmission":[256,271],"(SMT).":[257],"relation":[259],"results":[260],"new":[263],"(and":[264],"only":[266],"known)":[267],"1-round":[274],"(\u03b5,":[275],"\u03b4)-SMT":[276],"protocols.":[277],"discuss":[279],"our":[280],"results,":[281],"their":[283],"relations":[284],"other":[286],"works,":[287],"propose":[289],"directions":[290],"future":[292],"work.":[293]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
