[go: up one dir, main page]

Follow
Allison Beemer
Title
Cited by
Cited by
Year
A generalized algebraic approach to optimizing SC-LDPC codes
A Beemer, S Habib, CA Kelley, J Kliewer
2017 55th Annual Allerton Conference on Communication, Control, and …, 2017
282017
Belief propagation decoding of short graph-based channel codes via reinforcement learning
S Habib, A Beemer, J Kliewer
IEEE Journal on Selected Areas in Information Theory 2 (2), 627-640, 2021
252021
Avoiding trapping sets in SC-LDPC codes under windowed decoding
A Beemer, CA Kelley
2016 International Symposium on Information Theory and Its Applications …, 2016
182016
Learning to decode: Reinforcement learning for decoding of sparse graph-based channel codes
S Habib, A Beemer, J Kliewer
Advances in neural information processing systems 33, 22396-22406, 2020
172020
Explicit optimal-length locally repairable codes of distance 5
A Beemer, R Coatney, V Guruswami, HH López, F Pinero
2018 56th Annual Allerton Conference on Communication, Control, and …, 2018
172018
Network decoding
A Beemer, AB Kılıç, A Ravagnani
IEEE Transactions on Information Theory 69 (6), 3708-3730, 2023
112023
Authentication against a myopic adversary
A Beemer, O Kosut, J Kliewer, E Graves, P Yu
2019 IEEE Conference on Communications and Network Security (CNS), 1-5, 2019
112019
RELDEC: Reinforcement learning-based decoding of moderate length LDPC codes
S Habib, A Beemer, J Kliewer
IEEE Transactions on Communications 71 (10), 5661-5674, 2023
102023
Authentication and partial message correction over adversarial multiple-access channels
A Beemer, E Graves, J Kliewer, O Kosut, P Yu
2020 IEEE Conference on Communications and Network Security (CNS), 1-6, 2020
102020
Learned scheduling of LDPC decoders based on multi-armed bandits
S Habib, A Beemer, J Kliewer
2020 IEEE International Symposium on Information Theory (ISIT), 2789-2794, 2020
82020
Structured coding for authentication in the presence of a malicious adversary
A Beemer, O Kosut, J Kliewer, E Graves, P Yu
2019 IEEE International Symposium on Information Theory (ISIT), 617-621, 2019
82019
Network decoding against restricted adversaries
A Beemer, AB Kılıç, A Ravagnani
IFAC-PapersOnLine 55 (30), 236-241, 2022
62022
Analysis of absorbing sets using cosets and syndromes
E McMillon, A Beemer, CA Kelley
2020 IEEE International Symposium on Information Theory (ISIT), 367-372, 2020
62020
The curious case of the diamond network
A Beemer, A Ravagnani
arXiv preprint arXiv:2107.02144, 2021
52021
Authentication with mildly myopic adversaries
A Beemer, E Graves, J Kliewer, O Kosut, P Yu
2020 IEEE International Symposium on Information Theory (ISIT), 984-989, 2020
52020
Design and analysis of graph-based codes using algebraic lifts and decoding networks
A Beemer
The University of Nebraska-Lincoln, 2018
52018
Graph-based codes for hierarchical recovery
A Beemer, R Kshirsagar, GL Matthews
2022 IEEE International Symposium on Information Theory (ISIT), 1554-1559, 2022
42022
Absorbing sets of codes from finite geometries
A Beemer, K Haymaker, CA Kelley
Cryptography and Communications 11 (5), 1115-1131, 2019
42019
Extremal absorbing sets in low-density parity-check codes
E McMillon, A Beemer, CA Kelley
32023
Keyless authentication for awgn channels
E Graves, A Beemer, J Kliewer, O Kosut, PL Yu
IEEE Transactions on Information Theory 69 (1), 496-519, 2022
22022
The system can't perform the operation now. Try again later.
Articles 1–20