scispace - formally typeset
O

Oliver Kosut

Researcher at Arizona State University

Publications -  140
Citations -  3161

Oliver Kosut is an academic researcher from Arizona State University. The author has contributed to research in topics: Computer science & Communication channel. The author has an hindex of 22, co-authored 124 publications receiving 2678 citations. Previous affiliations of Oliver Kosut include Cornell University & Massachusetts Institute of Technology.

Papers
More filters
Proceedings ArticleDOI

The Gaussian interference channel in the presence of a malicious jammer

TL;DR: In this article, the authors considered the two-user Gaussian interference channel in the presence of one or two adversarial jammers and showed that the capacity of the interference channel is zero if the jammer has a greater received power than the legitimate user.
Proceedings ArticleDOI

Malicious data attacks against dynamic state estimation in the presence of random noise

TL;DR: Two estimators are proposed; one based on a non-convex optimization problem using sparsity constraints, the second a convex relaxation using a mixed ℓ1/ℓ2 norm.
Posted Content

Capacity of Cooperative Fusion in the Presence of Byzantine Sensors

TL;DR: In this paper, an information theoretic formulation is used to characterize the Shannon capacity of sensor fusion in the presence of Byzantine sensors and a capacity achieving transmit-then-verify strategy is proposed for the case that less than half of the sensors are Byzantine, and its error probability and coding rate is analyzed by using a Markov decision process modeling of the transmission protocol.
Posted Content

Asymptotics and Non-asymptotics for Universal Fixed-to-Variable Source Coding

TL;DR: In this article, the optimal third-order coding rates for general fixed-to-variable codes and for prefix codes were derived for finite blocklength and higher-order asymptotics regimes.
Proceedings ArticleDOI

Structured Coding for Authentication in the Presence of a Malicious Adversary

TL;DR: This work presents a structured coding scheme for keyless authentication over a discrete memoryless binary-input, symmetric adversarial channel that allows for coding rates up to the non-adversarial capacity of the underlying channel, as well as bounded-complexity decoding.