default search action
Boulat A. Bash
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c28]Rohan Bali, Ashley Tittelbaugh, Shelbi L. Jenkins, Anuj Agrawal, Jerry Horgan, Marco Ruffini, Daniel C. Kilper, Boulat A. Bash:
Routing and Spectrum Allocation in Broadband Degenerate EPR-Pair Distribution. ICC 2024: 4954-4960 - [c27]Zihao Gong, Boulat A. Bash:
On Two-Stage Quantum Estimation and Asymptotics of Quantum-Enhanced Transmittance Sensing. ISIT 2024: 801-806 - [i20]Zihao Gong, Boulat A. Bash:
Two-stage Quantum Estimation and the Asymptotics of Quantum-enhanced Transmittance Sensing. CoRR abs/2402.17922 (2024) - [i19]Rohan Bali, Ashley Tittelbaugh, Shelbi L. Jenkins, Anuj Agrawal, Jerry Horgan, Marco Ruffini, Daniel C. Kilper, Boulat A. Bash:
Routing and Spectrum Allocation in Broadband Quantum Entanglement Distribution. CoRR abs/2404.08744 (2024) - 2023
- [j12]Kumar Vijay Mishra, Peter G. Vouras, Boulat A. Bash, Maria Sabrina Greco:
Editorial Introduction to the Special Issue on Recent Advances in Wideband Signal Processing for Classical and Quantum Synthetic Apertures. IEEE J. Sel. Top. Signal Process. 17(2): 312-316 (2023) - [j11]Zihao Gong, Nathaniel Rodriguez, Christos N. Gagatsos, Saikat Guha, Boulat A. Bash:
Quantum-Enhanced Transmittance Sensing. IEEE J. Sel. Top. Signal Process. 17(2): 473-490 (2023) - [c26]Elyakim Zlotnick, Boulat A. Bash, Uzi Pereg:
Entanglement-Assisted Covert Communication via Qubit Depolarizing Channels. ISIT 2023: 198-203 - [c25]Johannes Rosenberger, Abdalla Ibrahim, Boulat A. Bash, Christian Deppe, Roberto Ferrara, Uzi Pereg:
Capacity Bounds for Identification With Effective Secrecy. ISIT 2023: 1202-1207 - [c24]Wesley Webb, Michael S. Bullock, Samuel H. Knarr, Timothy C. Burt, Jim A. Drakes, Saikat Guha, Boulat A. Bash, Victor G. Bucklew:
Spread Photon Transceiver for Quantum Secure Communications. MILCOM 2023: 103-108 - [i18]Elyakim Zlotnick, Boulat A. Bash, Uzi Pereg:
Entanglement-Assisted Covert Communication via Qubit Depolarizing Channels. CoRR abs/2305.05477 (2023) - [i17]Johannes Rosenberger, Abdalla Ibrahim, Boulat A. Bash, Christian Deppe, Roberto Ferrara, Uzi Pereg:
Capacity Bounds for Identification With Effective Secrecy. CoRR abs/2306.14792 (2023) - [i16]Rohan Bali, Ashley Tittelbaugh, Shelbi L. Jenkins, Anuj Agrawal, Jerry Horgan, Marco Ruffini, Daniel C. Kilper, Boulat A. Bash:
Routing and Spectrum Allocation in Broadband Degenerate EPR-Pair Distribution. CoRR abs/2311.14613 (2023) - 2022
- [c23]Tianrui Tan, Kwan Kit Lee, Amit Ashok, Animesh Datta, Boulat A. Bash:
Robust Adaptive Quantum-Limited Super-Resolution Imaging. IEEECONF 2022: 504-508 - [c22]Evan J. D. Anderson, Boulat A. Bash:
Fundamental Limits of Thermal-noise Lossy Bosonic Multiple Access Channel. GLOBECOM (Workshops) 2022: 1-6 - [c21]Zuhra Amiri, Boulat A. Bash, Janis Nötzel:
Performance of Quantum Preprocessing under Phase Noise. GLOBECOM (Workshops) 2022: 298-303 - [i15]Evan J. D. Anderson, Boulat A. Bash:
Fundamental Limits of Thermal-noise Lossy Bosonic Multiple Access Channel. CoRR abs/2207.00139 (2022) - [i14]Ali Cox, Quntao Zhuang, Christos N. Gagatsos, Boulat A. Bash, Saikat Guha:
Transceiver designs to attain the entanglement assisted communications capacity. CoRR abs/2208.07979 (2022) - 2021
- [c20]Evan J. D. Anderson, Saikat Guha, Boulat A. Bash:
Fundamental Limits of Bosonic Broadcast Channels. ISIT 2021: 766-771 - [c19]Mehrdad Tahmasbi, Boulat A. Bash, Saikat Guha, Matthieu R. Bloch:
Signaling for Covert Quantum Sensing. ISIT 2021: 1041-1045 - [c18]Zihao Gong, Christos N. Gagatsos, Saikat Guha, Boulat A. Bash:
Fundamental Limits of Loss Sensing over Bosonic Channels. ISIT 2021: 1182-1187 - 2020
- [j10]Michael S. Bullock, Christos N. Gagatsos, Saikat Guha, Boulat A. Bash:
Fundamental Limits of Quantum-Secure Covert Communication Over Bosonic Channels. IEEE J. Sel. Areas Commun. 38(3): 471-482 (2020) - [j9]Christos N. Gagatsos, Michael S. Bullock, Boulat A. Bash:
Covert Capacity of Bosonic Channels. IEEE J. Sel. Areas Inf. Theory 1(2): 555-567 (2020) - [c17]Saikat Guha, Quntao Zhuang, Boulat A. Bash:
Infinite-fold enhancement in communications capacity using pre-shared entanglement. ISIT 2020: 1835-1839 - [c16]Michael S. Bullock, Christos N. Gagatsos, Boulat A. Bash:
Capacity Theorems for Covert Bosonic Channels. ITW 2020: 1-5 - [i13]Saikat Guha, Quntao Zhuang, Boulat A. Bash:
Infinite-fold enhancement in communications capacity using pre-shared entanglement. CoRR abs/2001.03934 (2020)
2010 – 2019
- 2019
- [c15]Michael S. Bullock, Christos N. Gagatsos, Saikat Guha, Boulat A. Bash:
Fundamental Limits of Quantum-Secure Covert Communication over Bosonic Channels. Allerton 2019: 56-63 - [c14]Shakil Ahmed, Boulat A. Bash:
Average Worst-Case Secrecy Rate Maximization via UAV and Base Station Resource Allocation. Allerton 2019: 1176-1181 - [i12]Michael S. Bullock, Christos N. Gagatsos, Saikat Guha, Boulat A. Bash:
Fundamental limits of quantum-secure covert communication over bosonic channels. CoRR abs/1907.04228 (2019) - 2018
- [j8]Azadeh Sheikholeslami, Majid Ghaderi, Don Towsley, Boulat A. Bash, Saikat Guha, Dennis Goeckel:
Multi-Hop Routing in Covert Wireless Networks. IEEE Trans. Wirel. Commun. 17(6): 3656-3669 (2018) - [j7]Ramin Soltani, Dennis Goeckel, Don Towsley, Boulat A. Bash, Saikat Guha:
Covert Wireless Communication With Artificial Noise Generation. IEEE Trans. Wirel. Commun. 17(11): 7252-7267 (2018) - [c13]Dennis Goeckel, Azadeh Sheikholeslami, Tamara V. Sobers, Boulat A. Bash, Don Towsley, Saikat Guha:
Covert Communications in a Dynamic Interference Environment. SPAWC 2018: 1-5 - [i11]Azadeh Sheikholeslami, Majid Ghaderi, Don Towsley, Boulat A. Bash, Saikat Guha, Dennis Goeckel:
Multi-Hop Routing in Covert Wireless Networks. CoRR abs/1803.04100 (2018) - 2017
- [j6]Tamara V. Sobers, Boulat A. Bash, Saikat Guha, Don Towsley, Dennis Goeckel:
Covert Communication in the Presence of an Uninformed Jammer. IEEE Trans. Wirel. Commun. 16(9): 6193-6206 (2017) - [c12]Dennis Goeckel, Boulat A. Bash, Azadeh Sheikholeslami, Saikat Guha, Don Towsley:
Covert active sensing of linear systems. ACSSC 2017: 1692-1696 - [c11]Tamara V. Sobers, Boulat A. Bash, Saikat Guha, Don Towsley, Dennis Goeckel:
Covert communications on continuous-time channels in the presence of jamming. ACSSC 2017: 1697-1701 - [c10]Boulat A. Bash, Christos N. Gagatsos, Animesh Datta, Saikat Guha:
Fundamental limits of quantum-secure covert optical sensing. ISIT 2017: 3210-3214 - [i10]Ramin Soltani, Dennis Goeckel, Don Towsley, Boulat A. Bash, Saikat Guha:
Covert Wireless Communication with Artificial Noise Generation. CoRR abs/1709.07096 (2017) - 2016
- [j5]Dennis Goeckel, Boulat A. Bash, Saikat Guha, Don Towsley:
Covert Communications When the Warden Does Not Know the Background Noise Power. IEEE Commun. Lett. 20(2): 236-239 (2016) - [j4]Boulat A. Bash, Dennis Goeckel, Don Towsley:
Covert Communication Gains From Adversary's Ignorance of Transmission Time. IEEE Trans. Wirel. Commun. 15(12): 8394-8405 (2016) - [c9]Azadeh Sheikholeslami, Boulat A. Bash, Don Towsley, Dennis Goeckel, Saikat Guha:
Covert communication over classical-quantum channels. ISIT 2016: 2064-2068 - [i9]Azadeh Sheikholeslami, Boulat A. Bash, Donald F. Towsley, Dennis Goeckel, Saikat Guha:
Covert Communication over Classical-Quantum Channels. CoRR abs/1601.06826 (2016) - [i8]Tamara V. Sobers, Boulat A. Bash, Saikat Guha, Don Towsley, Dennis Goeckel:
Covert Communication in the Presence of an Uninformed Jammer. CoRR abs/1608.00698 (2016) - [i7]Ramin Soltani, Boulat A. Bash, Dennis Goeckel, Saikat Guha, Don Towsley:
Covert Single-hop Communication in a Wireless Network with Distributed Artificial Noise Generation. CoRR abs/1610.00384 (2016) - 2015
- [j3]Boulat A. Bash, Dennis Goeckel, Don Towsley, Saikat Guha:
Hiding information in noise: fundamental limits of covert wireless communication. IEEE Commun. Mag. 53(12): 26-31 (2015) - [c8]Tamara V. Sobers, Boulat A. Bash, Dennis Goeckel, Saikat Guha, Don Towsley:
Covert communication with the help of an uninformed jammer achieves positive rate. ACSSC 2015: 625-629 - [i6]Boulat A. Bash, Dennis Goeckel, Saikat Guha, Don Towsley:
Hiding Information in Noise: Fundamental Limits of Covert Wireless Communication. CoRR abs/1506.00066 (2015) - 2014
- [c7]Ramin Soltani, Boulat A. Bash, Dennis Goeckel, Saikat Guha, Don Towsley:
Covert single-hop communication in a wireless network with distributed artificial noise generation. Allerton 2014: 1078-1085 - [c6]Boulat A. Bash, Dennis Goeckel, Don Towsley:
LPD communication when the warden does not know when. ISIT 2014: 606-610 - [i5]Boulat A. Bash, Dennis Goeckel, Don Towsley:
LPD Communication when the Warden Does Not Know When. CoRR abs/1403.1013 (2014) - [i4]Boulat A. Bash, Saikat Guha, Dennis Goeckel, Don Towsley:
Quantum-noise limited communication with low probability of detection. CoRR abs/1403.5616 (2014) - [i3]Boulat A. Bash, Andrei H. Gheorghe, Monika Patel, Jonathan L. Habif, Dennis Goeckel, Don Towsley, Saikat Guha:
Covert Optical Communication. CoRR abs/1404.7347 (2014) - 2013
- [j2]Boulat A. Bash, Dennis Goeckel, Don Towsley:
Limits of Reliable Communication with Low Probability of Detection on AWGN Channels. IEEE J. Sel. Areas Commun. 31(9): 1921-1930 (2013) - [j1]Boulat A. Bash, Dennis Goeckel, Don Towsley:
Asymptotic Optimality of Equal Power Allocation for Linear Estimation of WSS Random Processes. IEEE Wirel. Commun. Lett. 2(3): 247-250 (2013) - [c5]Boulat A. Bash, Saikat Guha, Dennis Goeckel, Don Towsley:
Quantum noise limited optical communication with low probability of detection. ISIT 2013: 1715-1719 - 2012
- [c4]Boulat A. Bash, Dennis Goeckel, Don Towsley:
Square root law for communication with low probability of detection on AWGN channels. ISIT 2012: 448-452 - [i2]Boulat A. Bash, Dennis Goeckel, Don Towsley:
Square Root Law for Communication with Low Probability of Detection on AWGN Channels. CoRR abs/1202.6423 (2012) - [i1]Boulat A. Bash, Dennis Goeckel, Don Towsley:
Asymptotic Optimality of Equal Power Allocation for Linear Estimation of WSS Random Processes. CoRR abs/1212.2316 (2012) - 2011
- [c3]Boulat A. Bash, Dennis Goeckel, Donald F. Towsley:
Clustering in cooperative networks. INFOCOM 2011: 486-490
2000 – 2009
- 2007
- [c2]Boulat A. Bash, Peter Desnoyers:
Exact distributed Voronoi cell computation in sensor networks. IPSN 2007: 236-243 - 2004
- [c1]Boulat A. Bash, John W. Byers, Jeffrey Considine:
Approximately uniform random sampling in sensor networks. DMSN 2004: 32-39
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-12 23:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint