Prof. Dr.-Ing. Rafael F. Schaefer
Head of Chair
Since October 1st, 2022 Prof. Rafael Schaefer is the head of the Chair of Information Theory and Machine Learning at TU Dresden.
| Room | | BAR I/66 |
| E-Mail | | rafael.schaefer@tu-dresden.de |
| Google Scholar | | Profil |
Publications (FIS)
129 Entries
2021
-
Detectability of Denial-of-Service Attacks on Arbitrarily Varying Classical-Quantum Channels, 12 Jul 2021, 2021 IEEE International Symposium on Information Theory, ISIT 2021 - Proceedings. Institute of Electrical and Electronics Engineers (IEEE), p. 912-917, 6 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Doubly-Exponential Identification via Channels: Code Constructions and Bounds, 12 Jul 2021, 2021 IEEE International Symposium on Information Theory, ISIT 2021 - Proceedings. Institute of Electrical and Electronics Engineers (IEEE), p. 1147-1152, 6 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Secure Multi-Function Computation with Private Remote Sources, 12 Jul 2021, 2021 IEEE International Symposium on Information Theory, ISIT 2021 - Proceedings. Institute of Electrical and Electronics Engineers (IEEE), p. 1403-1408, 6 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Algorithmic Detection of Adversarial Attacks on Message Transmission and ACK/NACK Feedback, Jun 2021, ICC 2021 - IEEE International Conference on Communications, Proceedings. Institute of Electrical and Electronics Engineers (IEEE), p. 1-6Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
On the Algorithmic Solvability of Channel Dependent Classification Problems in Communication Systems, Jun 2021, In: IEEE/ACM Transactions on Networking. 29, 3, p. 1155-1168, 14 p., 9374798Electronic (full-text) versionResearch output: Contribution to journal > Research article
-
Reinforce Security: A Model-Free Approach towards Secure Wiretap Coding, Jun 2021, ICC 2021 - IEEE International Conference on Communications, Proceedings. Institute of Electrical and Electronics Engineers (IEEE), p. 1-6Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Turing Meets Shannon: Algorithmic Constructability of Capacity-Achieving Codes, Jun 2021, ICC 2021 - IEEE International Conference on Communications, Proceedings. Institute of Electrical and Electronics Engineers (IEEE), p. 1-6Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
An Overview of Information-Theoretic Security and Privacy: Metrics, limits and applications, Mar 2021, In: IEEE Journal on Selected Areas in Information Theory. 2, 1, p. 5-22, 18 p., 9380147Electronic (full-text) versionResearch output: Contribution to journal > Review article
-
Controllable Key Agreement with Correlated Noise, Mar 2021, In: IEEE Journal on Selected Areas in Information Theory. 2, 1, p. 82-94, 13 p., 9335630Electronic (full-text) versionResearch output: Contribution to journal > Research article
-
Editorial, Mar 2021, In: IEEE Journal on Selected Areas in Information Theory. 2, 1, p. 3-4, 2 p., 9380146Electronic (full-text) versionResearch output: Contribution to journal > Editorial (Lead article)
-
6G and the Post-Shannon Theory, 1 Jan 2021, Shaping Future 6G Networks: Needs, Impacts, and Technologies. Bertin, E., Crespi, N. & Magedanz, T. (eds.). Wiley-VHCA, p. 271-294, 24 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Chapter in book/Anthology/Report
-
An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions, Jan 2021, In: Entropy. 23, 1, p. 1-23, 23 p., 16Electronic (full-text) versionResearch output: Contribution to journal > Review article
-
A Reverse Jensen Inequality Result with Application to Mutual Information Estimation, 2021, 2021 IEEE Information Theory Workshop, ITW 2021 - Proceedings. Institute of Electrical and Electronics Engineers (IEEE), p. 1-6Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Communication over Block Fading Channels – An Algorithmic Perspective on Optimal Transmission Schemes, 2021, ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 4750-4754, 5 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Federated Learning with Local Differential Privacy: Trade-Offs between Privacy, Utility, and Communication, 2021, ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 2650-2654, 5 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Joint Active and Passive Secure Precoding in IRS-Aided MIMO Systems, 2021, 2021 IEEE Global Communications Conference (GLOBECOM). p. 1-6Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Multiple Noisy Private Remote Source Observations for Secure Function Computation, 2021, 55th Asilomar Conference on Signals, Systems and Computers, ACSSC 2021. Matthews, M. B. (ed.). IEEE Computer Society, p. 690-697, 8 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Quality of Service Guarantees for Physical Unclonable Functions, 2021, 2021 IEEE International Workshop on Information Forensics and Security, WIFS 2021. Institute of Electrical and Electronics Engineers (IEEE), p. 1-6Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Real Number Signal Processing can Detect Denial-of-Service Attacks, 2021, ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 4765-4769, 5 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Secure Lossy Function Computation with Multiple Private Remote Source Observations, 2021, WSA 2021 - 25th International ITG Workshop on Smart Antennas. VDE Verlag, Berlin [u. a.], p. 301-306, 6 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
2020
-
Secure Transmission in IRS-Assisted MIMO Systems with Active Eavesdroppers, 1 Nov 2020, Conference Record of the 54th Asilomar Conference on Signals, Systems and Computers, ACSSC 2020. Matthews, M. B. (ed.). IEEE Computer Society, p. 718-725, 8 p., 9443329Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
New Capacity Results for Fading Gaussian Multiuser Channels with Statistical CSIT, Nov 2020, In: IEEE Transactions on Communications. 68, 11, p. 6761-6774Electronic (full-text) versionResearch output: Contribution to journal > Research article
-
Randomized Nested Polar Subcode Constructions for Privacy, Secrecy, and Storage, 24 Oct 2020, Proceedings of 2020 International Symposium on Information Theory and its Applications, ISITA 2020. Institute of Electrical and Electronics Engineers (IEEE), p. 475-479, 5 p., 9366150Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Identification Capacity of Channels with Feedback: Discontinuity Behavior, Super-Activation, and Turing Computability, Oct 2020, In: IEEE Transactions on Information Theory. 66, 10, p. 6184-6199, 16 p., 9127469Electronic (full-text) versionResearch output: Contribution to journal > Research article
-
Deep learning based wiretap coding via mutual information estimation, 13 Jul 2020, WiseML 2020 - Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning. Association for Computing Machinery, p. 74-79, 6 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution