| A model for adversarial wiretap channels P Wang, R Safavi-Naini IEEE Transactions on Information Theory 62 (2), 970-983, 2015 | 40 | 2015 |
| Codes for limited view adversarial channels R Safavi-Naini, P Wang International Symposium on Information theory, 266-270, 2013 | 14 | 2013 |
| An efficient code for Adversarial Wiretap channel P Wang, R Safavi-Naini Information Theory Workshop, 40-44, 2014 | 13 | 2014 |
| Detecting Algebraic Manipulation in Leaky Storage Systems F Lin, R Safavi-Naini, P Wang Information Theoretic Security: 9th International Conference, ICITS 2016 …, 2016 | 7 | 2016 |
| Efficient codes for Limited View adversarial channels R Safavi-Naini, P Wang IEEE Conference on Communications and Network Security, 215-223, 2013 | 7 | 2013 |
| Limited View Adversary Codes: Bounds, Constructions and Applications P Wang, R Safavi-Naini International Conference on Information Theoretic Security, 214-235, 2015 | 6 | 2015 |
| A Model for Adversarial Wiretap Channels and its Applications R Safavi-Naini, P Wang Journal of Information Processing 23 (5), 554-561, 2015 | 6 | 2015 |
| A General Construction for 1-Round δ-RMT and (0, δ)-SMT R Safavi-Naini, MA Tuhin, P Wang Applied Cryptography and Network Security, 344-362, 2012 | 6 | 2012 |
| Erasure adversarial wiretap channels P Wang, R Safavi-Naini, F Lin 2015 53rd Annual Allerton Conference on Communication, Control, and …, 2015 | 5 | 2015 |
| Adversarial wiretap channel with public discussion P Wang, R Safavi-Naini IEEE Conference on Communications and Network Security, 281-289, 2015 | 5 | 2015 |
| Codes for detection of limited view algebraic tampering F Lin, R Safavi-Naini, P Wang International Conference on Information Security and Cryptology, 309-320, 2016 | 1 | 2016 |
| Information-theoretically secure key agreement over partially corrupted channels R Safavi-Naini, P Wang arXiv preprint arXiv:1604.03824, 2016 | 1 | 2016 |
| Secure Key Agreement over Partially Corrupted Channels R Safavi-Naini, P Wang 2018 IEEE International Symposium on Information Theory (ISIT), 2649-2653, 2018 | | 2018 |
| Interactive message transmission over adversarial wiretap channel II P Wang, R Safavi-Naini IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017 | | 2017 |
| Detecting Algebraic Manipulation in Leaky FLR Safavi-Naini, P Wang Information Theoretic Security: 9th International Conference, ICITS 2016 …, 2016 | | 2016 |