Ragnar Thobaben

ORCID: 0000-0001-9307-484X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cooperative Communication and Network Coding
  • Wireless Communication Security Techniques
  • Error Correcting Code Techniques
  • Advanced Wireless Communication Techniques
  • Advanced MIMO Systems Optimization
  • Advanced Wireless Communication Technologies
  • Cognitive Radio Networks and Spectrum Sensing
  • Algorithms and Data Compression
  • Cryptographic Implementations and Security
  • Stochastic Gradient Optimization Techniques
  • Energy Harvesting in Wireless Networks
  • Wireless Signal Modulation Classification
  • Distributed Sensor Networks and Detection Algorithms
  • Opinion Dynamics and Social Influence
  • Microwave Engineering and Waveguides
  • Wireless Communication Networks Research
  • Sparse and Compressive Sensing Techniques
  • Adversarial Robustness in Machine Learning
  • Full-Duplex Wireless Communications
  • Wireless Power Transfer Systems
  • Advanced Data Compression Techniques
  • Game Theory and Applications
  • Antenna Design and Analysis
  • Advanced Antenna and Metasurface Technologies
  • Privacy-Preserving Technologies in Data

KTH Royal Institute of Technology
2014-2024

EURECOM
2022

Kiel University
2003-2006

We show that polar codes asymptotically achieve the whole capacity-equivocation region for wiretap channel when wiretapper's is degraded with respect to main channel, and weak secrecy notion used. Our coding scheme also achieves capacity of physically receiver-orthogonal relay channel. simulation results moderate block length binary erasure comparing two edge type LDPC codes.

10.1109/lcomm.2010.08.100875 article EN IEEE Communications Letters 2010-08-01

We consider the symmetric discrete memoryless relay channel with orthogonal receiver components and show that polar codes are suitable for decode-and-forward compress-and-forward relaying. In first case we prove capacity achieving physically degraded channel; stochastically channels our construction provides an achievable rate. second construct sequences of achieve rate by nesting source compression into coding. both cases constructions inherit most properties codes. particular, encoding...

10.1109/tcomm.2012.081412.110266 article EN IEEE Transactions on Communications 2012-08-21

We investigate energy-efficient cooperation for secrecy in cognitive radio networks. In particular, we consider a four-node scenario where the secondary receiver is treated as potential eavesdropper with respect to primary transmission. The transmitter should ensure that message not leaked user by using cooperative jamming. optimal power allocation and splitting at our model maximize energy efficiency (EE) under constraints. formulate analyze an important EE Stackelberg game between two...

10.1109/lwc.2015.2432802 article EN IEEE Wireless Communications Letters 2015-05-13

State estimation is routinely being performed in high-voltage power transmission grids order to assist operation and detect faulty equipment. In low- medium-voltage distribution grids, on the other hand, few real-time measurements are traditionally available, often conducted based predicted historical data. Today, many parts of world, smart meters have been deployed at customers, their could principle be shared with operators real time enable improved state estimation. However, customers may...

10.1109/cdc.2015.7402921 article EN 2021 60th IEEE Conference on Decision and Control (CDC) 2015-12-01

Mushroom-type electromagnetic bandgap (EBG) structures are known to operate as high-impedance surfaces at low-frequency bands. They broadly used in the microwave regime. However, one of main drawbacks mushroom-type EBG is their narrow bandwidth. In this article, we propose a structure with glide-symmetric edge vias increase operational This bandwidth increment explained by physical insight provided an equivalent circuit model well description field behavior. Simulation and measurement...

10.1109/tmtt.2020.2966700 article EN IEEE Transactions on Microwave Theory and Techniques 2020-01-28

We study the detection and delay performance impacts of a feature-based physical layer authentication (PLA) protocol in mission-critical machine-type communication (MTC) networks. The PLA uses generalized likelihood-ratio testing based on line-of-sight (LOS), single-input multiple-output channel-state information order to mitigate impersonation attempts from an adversary node. performance, develop queueing model that captures erroneous decisions (i.e., false alarms missed detections), three...

10.1109/jsac.2019.2899421 article EN IEEE Journal on Selected Areas in Communications 2019-02-19

Abstract Background Whether early fluid accumulation is a risk factor for adverse renal outcomes in septic intensive care unit (ICU) patients remains uncertain. We assessed the association between cumulative balance and major kidney events within 30 days (MAKE30), composite of death, dialysis, or sustained dysfunction, such patients. Methods performed multicenter, retrospective observational study 1834 admitted to five ICUs three hospitals Stockholm, Sweden. used logistic regression analysis...

10.1186/s13613-022-01040-6 article EN cc-by Annals of Intensive Care 2022-07-04

We present a novel symbol-based soft-input posteriori probability (APP) decoder for packetized variable-length encoded source indexes transmitted over wireless channels where the residual redundancy after encoding is exploited error protection. In combination with mean-square or maximum APP estimation of reconstructed data, whole decoding process close to optimal. Furthermore, solutions proposed reduced complexity are discussed and compared near-optimal solution. When, in addition, channel...

10.1109/twc.2005.847032 article EN IEEE Transactions on Wireless Communications 2005-05-01

In this paper, we propose a new family of rate-compatible regular low-density parity-check (LDPC) convolutional codes. The construction is based on graph extension, i.e., the codes lower rates are generated by successively extending base code with highest rate. Theoretically, proposed can cover all rational from 0 to 1. addition, regularity degree distributions simplifies optimization. We prove analytically that LDPC different in capable achieving capacity binary erasure channel (BEC)....

10.1109/tit.2012.2188990 article EN IEEE Transactions on Information Theory 2012-02-24

We consider transmission over a wiretap channel where both the main and wiretapper's are binary erasure channels (BEC). A code construction method is proposed using two edge-type low-density parity-check (LDPC) codes based on coset encoding scheme. Using single LDPC ensemble with given threshold BEC, we give for same threshold. If has degree variable nodes, our gives rise to one nodes in used channel. This results zero In order circumvent this problem, distribution of numerically optimized....

10.1109/tit.2012.2219577 article EN IEEE Transactions on Information Theory 2012-10-02

We consider an extension of the cognitive radio channel model in which secondary transmitter has to obtain (``learn") primary message a first phase rather than having non-causal knowledge it. propose achievable rate region that combines elements decode--and--forward relaying w

10.4108/icst.crowncom.2012.248283 article EN 2012-01-01

In this letter, we present an improved index-based a-posteriori probability (APP) decoding approach for the error-resilient transmission of packetized variable-length encoded Markov sources. The proposed algorithm is based on a novel two-dimensional (2D) state representation which leads to three-dimensional trellis with unique transitions. APP realized by employing 2D version BCJR where all available source statistics can be fully exploited in decoder. For additional use channel codes...

10.1109/lcomm.2003.814718 article EN IEEE Communications Letters 2003-07-01

Cognitive radio describes a promising concept for improving the utilization of spectrum. It allows secondary users to access licensed spectrum in an opportunistic fashion, given that quality service primary is maintained. In this scenario, detection unused main obstacle: it requires recognition low- power signals noisy environment. Therefore, we consider case where cognitive are supported by wireless sensor network (WSN) providing beliefs on event user active. The provided WSN nodes then...

10.1109/acssc.2007.4487322 article EN Conference record/Conference record - Asilomar Conference on Signals, Systems, & Computers 2007-11-01

In this paper, we investigate the wiretap channel in presence of a cooperative relay node. We analyze and compare outage performance three cooperatives schemes: jamming (CJ), decode-and-forward (DF), amplify-and-forward (AF) for Rayleigh slow fading channel. particular, derive closed-form expression probability DF CJ strategies, which allows an optimal strategy selection terms performance. schemes through numerical simulations.

10.1109/wcnc.2011.5779323 article EN IEEE Wireless Communications and Networking Conference 2011-03-01

In this paper we present bilayer LDPC convolutional codes for half-duplex relay channels. Two types of codes, expurgated and lengthened are proposed decode-and-forward (DF) relaying. the case binary erasure channel, prove analytically that both code constructions achieve capacities source-relay link source-destination simultaneously, provided channel conditions known when designing codes. Meanwhile, enable highest transmission rate possible with DF relaying a wide range parameters. addition,...

10.1109/tcomm.2013.061013.120122 article EN IEEE Transactions on Communications 2013-06-19

We consider the coexistence of a multiple-input multiple-output secondary system with single-output primary link different degrees coordination between systems. First, for uncoordinated underlay cognitive radio scenario, we fully characterize optimal parameters that maximize rate subject to constraint transmission strategy combines splitting and interference cancellation. Second, establish model coordinated overlay scenario consists message-learning phase followed by communication phase....

10.1186/1687-1499-2013-195 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2013-07-18

In this paper, we investigate cooperative secure communications in a four-node cognitive radio network where the secondary receiver is treated as potential eavesdropper with respect to primary transmission. The user allowed transmit his own signals under condition that user's secrecy rate and transmission scheme are intact. Under setting, derive achievable rates related constraints guarantee weak rate, when Gelfand-Pinsker coding used at transmitter. addition, propose multiphase include: 1)...

10.1109/tccn.2016.2577043 article EN IEEE Transactions on Cognitive Communications and Networking 2016-03-01

Feature-based physical layer authentication (PLA) schemes, using position-specific channel characteristics as identifying features, can provide lightweight protection against impersonation attacks in overhead-limited applications like e.g., mission-critical and low-latency scenarios. However, with PLA-aware attack strategies, an attacker maximize the probability of successfully impersonating legitimate devices. In this paper, we worst-case detection performance bounds under such strategies...

10.1109/tcomm.2021.3073002 article EN IEEE Transactions on Communications 2021-04-13

In this article, we propose a new variational approach to learn private and/or fair representations. This is based on the Lagrangians of formulation privacy and fairness optimization problems that propose. formulation, aim generate representations data keep prescribed level relevant information not shared by or sensitive data, while minimizing remaining they keep. The proposed (i) exhibits similarities problems, (ii) allows us control trade-off between utility through Lagrange multiplier...

10.1109/itw48936.2021.9611429 article EN 2022 IEEE Information Theory Workshop (ITW) 2021-10-17

In this paper, we present a novel packetized bit-level decoding algorithm for variable-length encoded Markov sources, which calculates reliability information the decoded bits in form of posteriori probabilities (APPs). An interesting feature proposed approach is that symbol-based source statistics transition are exploited as priori on trellis. This method especially well-suited long input blocks, since contrast to other APP approaches, number trellis states does not depend packet length....

10.1109/tcomm.2005.860065 article EN IEEE Transactions on Communications 2005-12-01

In this paper, we address the design of distributed coding schemes for 3-node relay channel with half-duplex constraint. We first discuss general problem optimally re-encoding noisy data at and summarize recently proposed approximations. Based on an analysis extrinsic information transfer characteristics component codes investigate potential ldquoweakrdquo turbo or LDPC which are employed by source node in order to increase reliability when decoding is not possible. The results show that can...

10.1109/acssc.2008.5074564 article EN 2018 52nd Asilomar Conference on Signals, Systems, and Computers 2008-10-01

This paper explores the trade-off between cooperation and secrecy in cognitive radio networks. We consider a scenario consisting of primary secondary system. In simplest case, each system is represented by pair transmitter receiver. assume constraint on transmission sense that message has to be concealed from Both situations where aware unaware are investigated compared. first helps allocating power for jamming, which increases message. latter it can also act as relay message, thus improving...

10.1109/icc.2012.6364834 article EN 2012-06-01

In this paper, typical uplink scenarios in a cellular system are considered, where two cooperating mobile stations (serving, for example, as relays) transmitting the some information to base station by using distributed space-time coding scheme. Due nature of system, transmitted signals typically subject different average path losses. For fixed distances between and station, error performance scheme is determined analytically. Then, based on considerations concerning spatial distribution...

10.1109/glocom.2004.1378876 article EN 2005-04-05

In this paper we consider the coexistence of a single-input single-output (SISO) primary link with multiple-input (MISO) secondary user pair that has non-causal knowledge message. We study an achievable rate region exploits by combining selfless relaying to maintain supported dirty coding pre-cancel interference at receiver. find optimal choice power allocation between these operating modes transmitter as well beamforming vectors. Moreover, address robustness solution uncertainties in...

10.1109/wcnc.2012.6214426 article EN 2022 IEEE Wireless Communications and Networking Conference (WCNC) 2012-04-01
Coming Soon ...