O
Oliver Kosut
Researcher at Arizona State University
Publications - 140
Citations - 3161
Oliver Kosut is an academic researcher from Arizona State University. The author has contributed to research in topics: Computer science & Communication channel. The author has an hindex of 22, co-authored 124 publications receiving 2678 citations. Previous affiliations of Oliver Kosut include Cornell University & Massachusetts Institute of Technology.
Papers
More filters
Proceedings ArticleDOI
The Gaussian interference channel in the presence of a malicious jammer
TL;DR: In this article, the authors considered the two-user Gaussian interference channel in the presence of one or two adversarial jammers and showed that the capacity of the interference channel is zero if the jammer has a greater received power than the legitimate user.
Proceedings ArticleDOI
Malicious data attacks against dynamic state estimation in the presence of random noise
TL;DR: Two estimators are proposed; one based on a non-convex optimization problem using sparsity constraints, the second a convex relaxation using a mixed ℓ1/ℓ2 norm.
Posted Content
Capacity of Cooperative Fusion in the Presence of Byzantine Sensors
Oliver Kosut,Lang Tong +1 more
TL;DR: In this paper, an information theoretic formulation is used to characterize the Shannon capacity of sensor fusion in the presence of Byzantine sensors and a capacity achieving transmit-then-verify strategy is proposed for the case that less than half of the sensors are Byzantine, and its error probability and coding rate is analyzed by using a Markov decision process modeling of the transmission protocol.
Posted Content
Asymptotics and Non-asymptotics for Universal Fixed-to-Variable Source Coding
Oliver Kosut,Lalitha Sankar +1 more
TL;DR: In this article, the optimal third-order coding rates for general fixed-to-variable codes and for prefix codes were derived for finite blocklength and higher-order asymptotics regimes.
Proceedings ArticleDOI
Structured Coding for Authentication in the Presence of a Malicious Adversary
TL;DR: This work presents a structured coding scheme for keyless authentication over a discrete memoryless binary-input, symmetric adversarial channel that allows for coding rates up to the non-adversarial capacity of the underlying channel, as well as bounded-complexity decoding.