Frédérique Oggier

ORCID: 0000-0003-3141-3118
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Coding theory and cryptography
  • Cooperative Communication and Network Coding
  • graph theory and CDMA systems
  • Advanced Data Storage Technologies
  • Wireless Communication Security Techniques
  • Caching and Content Delivery
  • Advanced Wireless Communication Techniques
  • Cellular Automata and Applications
  • Distributed systems and fault tolerance
  • Wireless Communication Networks Research
  • Complex Network Analysis Techniques
  • Error Correcting Code Techniques
  • Full-Duplex Wireless Communications
  • Advanced Wireless Communication Technologies
  • Finite Group Theory Research
  • Chaos-based Image/Signal Encryption
  • DNA and Biological Computing
  • Blockchain Technology Applications and Security
  • Advanced Algebra and Logic
  • Cryptographic Implementations and Security
  • Rings, Modules, and Algebras
  • Advanced Topics in Algebra
  • Algorithms and Data Compression
  • Distributed and Parallel Computing Systems
  • semigroups and automata theory

Nanyang Technological University
2015-2024

California State University, Northridge
2013

California Institute of Technology
2005-2010

Southern California University for Professional Studies
2007

University of Southern California
2007

École Polytechnique Fédérale de Lausanne
2003-2006

Swiss Epilepsy Center
2004

University of Geneva
2002

We consider the MIMO wiretap channel, that is a broadcast channel where transmitter sends some confidential information to one user which legitimate receiver, while other an eavesdropper. Perfect secrecy achieved when and receiver can communicate at positive rate, insuring eavesdropper gets zero bits of information. In this paper, we compute perfect capacity multiple antenna number antennas arbitrary for both two receivers. Our technique involves careful study Sato-like upper bound via...

10.1109/tit.2011.2158487 article EN IEEE Transactions on Information Theory 2011-08-01

In this paper, we introduce the notion of perfect space-time block codes (STBCs). These have full-rate, full-diversity, nonvanishing constant minimum determinant for increasing spectral efficiency, uniform average transmitted energy per antenna and good shaping. We present algebraic constructions STBCs 2, 3, 4, 6 antennas

10.1109/tit.2006.880010 article EN IEEE Transactions on Information Theory 2006-08-29

We consider the MIMO wiretap channel, that is a broadcast channel where transmitter sends some confidential information to one user which legitimate receiver, while other an eavesdropper. Perfect secrecy achieved when and receiver can communicate at positive rate, insuring eavesdropper gets zero bits of information. In this paper, we compute perfect capacity multiple antenna number antennas arbitrary for both two receivers. Our technique involves careful study Sato-like upper bound via...

10.1109/isit.2008.4595041 article EN 2008-07-01

Erasure codes provide a storage efficient alternative to replication based redundancy in (networked) systems. They however entail high communication overhead for maintenance, when some of the encoded fragments are lost and need be replenished. Such overheads arise from fundamental recreate (or keep separately) first copy whole object before any individual fragment can generated There has recently been intense interest explore alternatives, most prominent ones being regenerating (RGC)...

10.1109/infcom.2011.5934901 article EN 2011-04-01

In this correspondence, we present various families of full diversity rotated Z/sup n/-lattice constellations based on algebraic number theory constructions. We are able to give closed-form expressions their minimum product distance using the corresponding properties.

10.1109/tit.2004.825045 article EN IEEE Transactions on Information Theory 2004-03-30

Distributed storage systems need to store data redundantly in order provide some fault-tolerance and guarantee system reliability. Different coding techniques have been proposed the required redundancy more efficiently than traditional replication schemes. However, compared replication, are less efficient for repairing lost redundancy, as they require retrieval of larger amounts from subsets nodes. To mitigate these problems, several recent works presented locally repairable codes designed...

10.1109/isit.2013.6620355 preprint EN 2013-07-01

We consider the Gaussian wiretap channel, where two legitimate players Alice and Bob communicate over an additive white noise (AWGN) while Eve is eavesdropping, also through AWGN channel. propose a coding strategy based on lattice coset encoding. define secrecy gain as design criterion for codes, expressed in terms of theta series, which characterizes Eve's confusion function channel parameters. The studied even unimodular lattices, asymptotic analysis shows that it grows exponentially...

10.1109/tit.2015.2494594 article EN IEEE Transactions on Information Theory 2015-10-22

This tutorial reviews fundamental contributions to information security. An integrative viewpoint is taken that explains the security metrics, including secrecy, privacy, and others, methodology of information-theoretic approaches, along with arising system design principles, as well techniques enable designs be applied in real communication computing systems. The tutorial, while summarizing these contributions, argues for simultaneous pivotal role limits coding secure design.

10.1109/jsait.2021.3062755 article EN publisher-specific-oa IEEE Journal on Selected Areas in Information Theory 2021-03-01

Algebraic number theory is having an increasing impact in code design for many different coding applications, such as single antenna fading channels and more recently, MIMO systems.Extended work has been done on channels, algebraic lattice codes have proven to be effective tool.The general framework settled the last ten years explicit constructions based are now available.The aim of this provide both overview designs Rayleigh well a tutorial introduction theory.The basic facts mathematical...

10.1561/0100000003 article EN Foundations and Trends® in Communications and Information Theory 2004-01-01

We propose the notion of secrecy gain as a code design criterion for wiretap lattice codes to be used over an additive white Gaussian noise channel. Our analysis relies on error probabilites both legitimate user and eavesdropper. focus geometrical properties lattices, described by their theta series, characterize good codes.

10.1109/isita.2010.5650095 preprint EN 2010-10-01

The Bitcoin network is a complex that records anonymous financial transactions while encapsulating the relationships among its pseudonymous users. This paper proposes graph mining techniques to explore wallet addresses (pseudonyms for users) suspected be involved in given extortion racket, exploiting anonymity of collect and launder money. Starting around potential interest, neighborhood subgraphs are analyzed terms path length confluence detect suspicious flow other controlled by...

10.1109/icdmw.2018.00043 article EN 2022 IEEE International Conference on Data Mining Workshops (ICDMW) 2018-11-01

Multiple-input double-output (MIDO) codes are important in the near-future wireless communications, where portable end-user device is physically small and will typically contain at most two receive antennas. Especially tempting 4 x 2 channel due to its immediate applicability digital video broadcasting (DVB). Such channels optimally employ rate-two space-time (ST) consisting of (4 4) matrices. Unfortunately, such general very complex decode, hence setting forth a call for constructions with...

10.1109/tit.2011.2176310 article EN IEEE Transactions on Information Theory 2011-11-18

This paper studies the design of distributed space-time codes for use in wireless relay networks. Earlier work suggested that a suitable family can be obtained by using linear dispersion codes, provided basis matrices were unitary. In this we construct an explicit algebraic such where full diversity is proved. The construction uses cyclotomic field theory and yields are indeed Simulation results show have better performance than designed earlier ad hoc random methods, thus with less encoding...

10.1109/isit.2006.261774 article EN 2006-07-01

Coding for the Gaussian Wiretap Channel can be done with nested lattices. The fine lattice must designed in same way as lattices used on regular while coarse one a whose theta series is minimized. We present criterion of design both and when Rayleigh fading wiretap channel.

10.1109/iccw.2011.5963544 article EN 2011-06-01

Self-Repairing Codes (SRC) are codes designed to suit the need of coding for distributed networked storage: they not only allow stored data be recovered even in presence node failures, also provide a repair mechanism where as little two live nodes can contacted regenerate failed node. In this paper, we propose new instance self-repairing codes, based on constructions spreads coming from projective geometry. We study some their properties demonstrate suitability these storage.

10.1109/itw.2011.6089443 article EN 2011-10-01

We propose a lattice construction from totally real and CM fields, which naturally generalizes the Construction A of lattices $p$-ary codes obtained cyclotomic field $\mathbb{Q}(\zeta_p)$, $p$ prime, in turn contains so-called binary as particular case. focus on maximal subfield $\mathbb{Q}(\zeta_{p^r}+\zeta_{p}^{-r})$ $\mathbb{Q}(\zeta_{p^r})$, $r\geq 1$. Our has applications to coset encoding algebraic codes, we detail case block fading wiretap codes.

10.1109/tit.2015.2416340 article EN IEEE Transactions on Information Theory 2015-03-25

The Rankin constant $\gamma_{n,l}$ measures the largest volume of densest sublattice rank $l$ a lattice $\Lambda\in \RR^n$ over all such lattices $n$. Berg\'e-Martinet $\gamma'_{n,l}$ is variation that takes into account dual lattice. Exact values and bounds for both constants are mostly open in general. We consider case built from linear codes, look at on $\gamma'_{n,l}$. In particular, we revisit known results $n=3,4,5,8$ give lower upper cases $\gamma_{5,2},\gamma_{7,2}$...

10.48550/arxiv.2501.08105 preprint EN arXiv (Cornell University) 2025-01-14

10.1561/0100000016 article EN Foundations and Trends® in Communications and Information Theory 2007-01-01

Recent years have witnessed a slew of coding techniques custom designed for networked storage systems. Network inspired regenerating codes are the most prolifically studied among these new age centric codes. A lot effort has been invested in understanding fundamental achievable trade-offs and bandwidth usage to maintain redundancy presence different models failures, showcasing efficacy with respect traditional erasure techniques. For practical usability open adversarial environments, as is...

10.1109/p2p.2011.6038668 article EN 2011-08-01
Coming Soon ...