T. F. Wong, T. Ward, J. M. Shea, M. Menendez, D. Greene, and C. Bowyer, “A Dynamic Spectrum Sharing Design in the DARPA Spectrum Collaboration Challenge,” GOMACTech 2020, San Diego, CA, Mar. 2020. To appear.
Digital Communications with SDRs: A graduate-level course about practical digital communication techniques taught based on USRP radios
E. Graves and T. F. Wong, “Equal-image-size source partitioning: Creating strong Fano’s inequalities for multi-terminal discrete memoryless channels,” arXiv:1512.00824, 2015.
E. Graves and T. F. Wong, “Equating the achievable exponent region to the achievable entropy region by partitioning the source,” in Proc. 2014 IEEE Intern. Symp. Info. Theory (ISIT), June 2014.
Information Integrity
Information transfer with guaranteed integrity
E. Graves and T. F. Wong, “Information integrity between correlated sources through Wyner-Ziv coding,” in Proc. 2015 IEEE Info. Theory Workshop, Jeju Island, Korea, Oct. 2015.
E. Graves and T. F. Wong, “Information integrity in lossy source coding with side information,” in Proc. 52nd Annual Allerton Conference on Communication, Control, and Computing, pp. 1267-1271, Monticello, IL, Oct. 2014.
E. Graves and T. F. Wong, “A coding approach to guarantee information integrity against a Byzantine relay,” IEEE ISIT, July 2013. Submission version available: arXiv:1302.0059 (a condition is missing from the theorem statement!)
Detectability of substitution attacks
R. Cao, T. F. Wong, T. Lv, H. Gao, and S. Yang, “Detecting Byzantine attacks without clean reference,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 12, pp. 2717 – 2731, Dec. 2016.
R. Cao, E. Graves, T. F. Wong, and T. Lv, “Detecting Substitution Attacks Against Non-colluding Relays,” IEEE Globecom, Dec. 2013.
T. F. Wong, M. Bloch, and J. M. Shea, “Secret sharing over fast-fading MIMO wireless channels,” EURASIP Journal on Wireless Communications and Networking, Special Issue on Wireless Physical Layer Security, Sep. 2009.