- Wireless Communication Security Techniques
- Cooperative Communication and Network Coding
- Chaos-based Image/Signal Encryption
- Advanced MIMO Systems Optimization
- Error Correcting Code Techniques
- DNA and Biological Computing
- Cellular Automata and Applications
- Computability, Logic, AI Algorithms
- Physical Unclonable Functions (PUFs) and Hardware Security
- Wireless Signal Modulation Classification
- Advanced Wireless Communication Technologies
- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Advanced Wireless Communication Techniques
- Magnetic properties of thin films
- Energy Harvesting in Wireless Networks
- Coding theory and cryptography
- Security in Wireless Sensor Networks
- Full-Duplex Wireless Communications
- Distributed Sensor Networks and Detection Algorithms
- Magnetic Properties and Applications
- Biometric Identification and Security
- Adversarial Robustness in Machine Learning
- Digital Media Forensic Detection
- graph theory and CDMA systems
TU Dresden
2015-2025
Technical University of Munich
2013-2024
Barkhausen Institute
2024
University of Siegen
2021-2022
Technische Universität Berlin
2016-2021
Folkwang University of the Arts
2021
Leibniz Institute for Solid State and Materials Research
2001-2021
Munich Center for Quantum Science and Technology
2019
Princeton University
2014-2018
DSI Informationstechnik (Germany)
2013
Color-coded computer graphics representations of the electrostatic potentials trypsin, trypsin-inhibitor, prealbumin and its thyroxine complex, fragments double-helical DNA, a netropsin--DNA complex illustrate topographic complementarity in macromolecule-ligand interactions. This approach is powerful revealing intermolecular specificity shows promise having predictive value drug design.
Significance Security is a very important issue in the design and use of wireless networks. Traditional methods providing security such networks are impractical for some emerging types due to light computational abilities devices [such as radio-frequency identification (RFID) tags, certain sensors, etc.] or large scale loose organizational structure Physical layer has potential address these concerns by taking advantage fundamental ability physics radio propagation provide security. This...
This paper investigates the maximal secret communication rate over a wiretap channel subject to reliability and secrecy constraints at given blocklength. New achievability converse bounds are derived, which uniformly tighter than existing bounds, lead tightest on second-order coding for discrete memoryless Gaussian channels. The exact is established semi-deterministic channels, characterizes optimal tradeoff between in finite-blocklength regime. Underlying our two new privacy amplification...
This tutorial reviews fundamental contributions to information security. An integrative viewpoint is taken that explains the security metrics, including secrecy, privacy, and others, methodology of information-theoretic approaches, along with arising system design principles, as well techniques enable designs be applied in real communication computing systems. The tutorial, while summarizing these contributions, argues for simultaneous pivotal role limits coding secure design.
Federated learning (FL) allows to train a massive amount of data privately due its decentralized structure. Stochastic gradient descent (SGD) is commonly used for FL good empirical performance, but sensitive user information can still be inferred from weight updates shared during iterations. We consider Gaussian mechanisms preserve local differential privacy (LDP) in the model with SGD. The trade-offs between privacy, global utility, and transmission rate are proved by defining appropriate...
This work considers the problem of mitigating information leakage between communication and sensing in systems jointly performing both operations. Specifically, a discrete memoryless state-dependent broadcast channel model is studied which (i) presence feedback enables transmitter to convey information, while simultaneously state estimation; one receivers treated as an eavesdropper whose should be estimated but remain oblivious part transmitted information. The abstracts challenges behind...
New generation head-mounted displays, such as VR and AR glasses, are coming into the market with already integrated eye tracking expected to enable novel ways of human-computer interaction in numerous applications. However, since movement properties contain biometric information, privacy concerns have be handled properly. Privacy-preservation techniques differential mechanisms recently been applied data obtained from displays. Standard mechanisms; however, vulnerable due temporal...
It is becoming more important that next-generation wireless networks wisely integrate multiple services at the physical layer to increase spectral efficiency. In this article, service integration in considered, where senders not only transmit individual data certain receivers but also additional multicast or confidential have be kept secret from nonlegitimate receivers. context, security techniques are a promising complement cryptographic since they establish using properties of channel....
The classical wiretap channel models secure communication in the presence of a nonlegitimate wiretapper who has to be kept ignorant. Traditionally, is passive sense that he only tries eavesdrop using his received output. In this paper, more powerful active wiretappers are studied. addition eavesdropping, these able influence conditions all users by controlling corresponding states. Since legitimate transmitters and receivers do not know actual realization or wiretapper's strategy influencing...
Information theoretic approaches to security have been examined as a promising complement current cryptographic techniques. Such information establish reliable communication and data confidentiality directly at the physical layer of network by taking properties noisy channel into account leading unconditional regardless computational capabilities eavesdroppers. The provision accurate state is major challenge particularly in wireless systems, especially about channels In addition, there might...
This paper investigates the maximal secrecy rate over a wiretap channel subject to reliability and constraints at given blocklength. New achievability converse bounds are derived, which shown be tighter than existing bounds. The also lead tightest second-order coding for discrete memoryless Gaussian channels.
In this paper, we study the impacts of transmit antenna selection on secrecy performance massive MIMO systems. We consider a wiretap setting in which fixed number antennas are selected and then confidential messages transmitted over them to multi-antenna legitimate receiver while being overheard by eavesdropper. For setup, derive an accurate approximation instantaneous rate. Using approximation, it is shown that some settings under growth active enhances system up optimal degrades when...
The wiretap channel models secure communication between two users in the presence of an eavesdropper who must be kept ignorant transmitted messages. performance such a system is usually characterized by its secrecy capacity which determines maximum transmission rate communication. In this paper, issue whether or not continuous function parameters examined. particular, done for uncertainty modeled via compound channels and arbitrarily varying channels, legitimate know only that true...
We consider a cache-aided wireless device-to-device (D2D) network of the type introduced by Ji et al., where placement phase is orchestrated central server. assume that devices' caches are filled with uncoded data, and whole content database contained in collection caches. After cache phase, files requested users serviced inter-device multicast communication. For such system setting, we provide exact characterization optimal load-memory trade-off under assumptions one-shot delivery. In...
End-to-end learning of communication systems with neural networks and particularly autoencoders is an emerging research direction which gained popularity in the last year. In this approach, learn to simultaneously optimize encoding decoding functions establish reliable message transmission. paper, line thinking extended scenarios eavesdropper must further be kept ignorant about communication. The secrecy transmission achieved by utilizing a modified secure loss function based on...
Wireless communication systems are inherently vulnerable to intentional jamming. In this paper, two classes of such jammers considered: those with partial and full knowledge. While the first class accounts for that know encoding decoding function, latter further aware actual transmitted message. Of particular interest so-called denial-of-service (DoS) attacks in which jammer is able completely disrupt any transmission. Accordingly, it crucial legitimate users detect adversarial DoS attacks....
In intelligent reflecting surface (IRS)-aided multiple-input multiple-output (MIMO) systems, the IRS can be utilized to suppress information leakage towards malicious terminals. This lead significant secrecy gains. work exploits these gains via a tractable <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">joint</i> design of downlink beamformers and phase-shifts. this respect, we consider generic IRS-aided MIMO wiretap setting invoke fractional...
How to provide information security while fulfilling ultra reliability and low-latency requirements is one of the major concerns for enabling next generation ultra-reliable communications service (xURLLC), specially in machine-type communications. In this work, we investigate reliability-security tradeoff by defining leakage-failure probability, a metric that jointly characterizes both performances short-packet transmissions. We discover system performance can be enhanced,...
This paper studies the computability of secrecy capacity fast-fading wiretap channels from an algorithmic perspective, examining whether it can be computed algorithmically or not. To address this question, concept Turing machines is used, which establishes fundamental performance limits digital computers. It shown that certain computable continuous fading probability distribution functions yield capacities are non-computable numbers. Additionally, we assess capacity's classification within...
We consider a secure integrated sensing and communication (ISAC) scenario, where signal is transmitted through state-dependent wiretap channel with one legitimate receiver which the transmitter communicates honest-but-curious target that wants to sense. The ISAC modeled as two fast-fading channels correlated Rayleigh fading coefficients independent additive Gaussian noise components. Delayed outputs are fed back improve performance estimate state sequence. establish illustrate an achievable...
Different transforms used in binding a secret key to correlated physical-identifier outputs are compared. Decorrelation efficiency is the metric determine that give highly-uncorrelated outputs. Scalar quantizers applied transform extract uniformly distributed bit sequences which keys bound. A set of perform well terms decorrelation ring oscillator (RO) improve uniqueness and reliability extracted sequences, reduce hardware area information leakage about RO outputs, maximize secret-key...
Strong secrecy capacity of compound wiretap channels is studied. The known lower bounds for the finite-state memoryless under discrete alphabets are extended to arbitrary uncertainty sets and continuous strong criterion. conditions which these tight given. Under saddle-point condition, shown be equal that worst-case channel. Based on this, Gaussian multiple-input multiple-output channel studied spectral norm constraint without degradedness assumption. First, it assumed only eavesdropper...
End-to-end deep learning for communication systems, i.e., systems whose encoder and decoder are learned, has attracted significant interest recently, due to its performance which comes close well-developed classical encoder-decoder designs. However, one of the drawbacks current approaches is that a differentiable channel model needed training underlying neural networks. In real-world scenarios, such hardly available often density not even known at all. Some works, therefore, focus on...