Limits of Reliable Communication with Low Probability of Detection on AWGN Channels, IEEE Journal on Selected Areas in Communications, vol.31, issue.9, pp.1921-1930, 2013. ,
DOI : 10.1109/JSAC.2013.130923
Reliable deniable communication: Hiding messages in noise, 2013 IEEE International Symposium on Information Theory, 2013. ,
DOI : 10.1109/ISIT.2013.6620765
URL : http://arxiv.org/abs/1304.6693
Fundamental Limits of Communication With Low Probability of Detection, IEEE Transactions on Information Theory, vol.62, issue.6, pp.3493-3503, 2016. ,
DOI : 10.1109/TIT.2016.2548471
URL : https://hal.archives-ouvertes.fr/hal-01345907
Covert Communication Over Noisy Channels: A Resolvability Perspective, IEEE Transactions on Information Theory, vol.62, issue.5, pp.2334-2354, 2016. ,
DOI : 10.1109/TIT.2016.2530089
URL : http://arxiv.org/abs/1503.08778
Reliable deniable communication with channel uncertainty, 2014 IEEE Information Theory Workshop (ITW 2014), 2014. ,
DOI : 10.1109/ITW.2014.6970786
Achieving Undetectable Communication, IEEE Journal of Selected Topics in Signal Processing, vol.9, issue.7, pp.1195-1205, 2015. ,
DOI : 10.1109/JSTSP.2015.2421477
Covert Communication in the Presence of an Uninformed Jammer, IEEE Transactions on Wireless Communications ,
DOI : 10.1109/TWC.2017.2720736
The Likelihood Encoder for Lossy Compression, IEEE Transactions on Information Theory, vol.62, issue.4, pp.1836-1849, 2016. ,
DOI : 10.1109/TIT.2016.2529657
URL : http://arxiv.org/abs/1408.4522
Strong Secrecy for Cooperative Broadcast Channels, IEEE Transactions on Information Theory, vol.63, issue.1, pp.469-495, 2017. ,
DOI : 10.1109/TIT.2016.2622058
URL : http://arxiv.org/abs/1601.01286
Wiretap channels with random states non-causally available at the encoder, 2016 IEEE International Conference on the Science of Electrical Engineering (ICSEE) ,
DOI : 10.1109/ICSEE.2016.7806196
URL : http://arxiv.org/abs/1608.00743
Coding for channel with random parameters, Probl. Control Inf. Theory, vol.9, pp.19-31, 1980. ,
Steganography in Digital Media: Principles, Algorithms, and Applications, 2009. ,
DOI : 10.1017/CBO9781139192903
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions, IEEE Transactions on Information Theory, vol.54, issue.6, pp.2706-2722, 2008. ,
DOI : 10.1109/TIT.2008.921684
URL : http://arxiv.org/abs/cs/0702161
Achievable rates for queue-based timing stegocodes, 2009 IEEE Information Theory Workshop, 2009. ,
DOI : 10.1109/ITW.2009.5351197
Covert communication with channel-state information at the transmitter ,
URL : https://hal.archives-ouvertes.fr/hal-01556729
Testing statistical hypotheses, 2005. ,
Network information theory, 2011. ,
DOI : 10.1017/CBO9781139030687
Information Theory: Coding Theorems for Discrete Memoryless Systems, 2011. ,
DOI : 10.1017/CBO9780511921889
Writing on dirty paper (Corresp.), IEEE Transactions on Information Theory, vol.29, issue.3, pp.439-441, 1983. ,
DOI : 10.1109/TIT.1983.1056659
Elements of information theory, 1991. ,
DOI : 10.1002/047174882x
Approximation theory of output statistics, IEEE Transactions on Information Theory, vol.39, issue.3, pp.752-772, 1993. ,
DOI : 10.1109/18.256486
Distributed Channel Synthesis, IEEE Transactions on Information Theory, vol.59, issue.11, pp.7071-7096, 2013. ,
DOI : 10.1109/TIT.2013.2279330
URL : http://arxiv.org/pdf/1208.4415