{"oa_version":"Preprint","main_file_link":[{"open_access":"1","url":"https://doi.org/10.48550/arXiv.1801.05951"}],"page":"4901-4948","external_id":{"arxiv":["1801.05951"],"isi":["000838527100004"]},"volume":68,"date_updated":"2023-08-04T10:08:49Z","intvolume":" 68","doi":"10.1109/tit.2022.3167554","isi":1,"year":"2022","citation":{"apa":"Zhang, Y., Vatedka, S., Jaggi, S., & Sarwate, A. D. (2022). Quadratically constrained myopic adversarial channels. IEEE Transactions on Information Theory. Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/tit.2022.3167554","mla":"Zhang, Yihan, et al. “Quadratically Constrained Myopic Adversarial Channels.” IEEE Transactions on Information Theory, vol. 68, no. 8, Institute of Electrical and Electronics Engineers, 2022, pp. 4901–48, doi:10.1109/tit.2022.3167554.","ista":"Zhang Y, Vatedka S, Jaggi S, Sarwate AD. 2022. Quadratically constrained myopic adversarial channels. IEEE Transactions on Information Theory. 68(8), 4901–4948.","ieee":"Y. Zhang, S. Vatedka, S. Jaggi, and A. D. Sarwate, “Quadratically constrained myopic adversarial channels,” IEEE Transactions on Information Theory, vol. 68, no. 8. Institute of Electrical and Electronics Engineers, pp. 4901–4948, 2022.","ama":"Zhang Y, Vatedka S, Jaggi S, Sarwate AD. Quadratically constrained myopic adversarial channels. IEEE Transactions on Information Theory. 2022;68(8):4901-4948. doi:10.1109/tit.2022.3167554","chicago":"Zhang, Yihan, Shashank Vatedka, Sidharth Jaggi, and Anand D. Sarwate. “Quadratically Constrained Myopic Adversarial Channels.” IEEE Transactions on Information Theory. Institute of Electrical and Electronics Engineers, 2022. https://doi.org/10.1109/tit.2022.3167554.","short":"Y. Zhang, S. Vatedka, S. Jaggi, A.D. Sarwate, IEEE Transactions on Information Theory 68 (2022) 4901–4948."},"publication_status":"published","department":[{"_id":"MaMo"}],"month":"08","type":"journal_article","_id":"12273","title":"Quadratically constrained myopic adversarial channels","article_type":"original","oa":1,"date_created":"2023-01-16T10:01:19Z","scopus_import":"1","day":"01","quality_controlled":"1","abstract":[{"lang":"eng","text":"We study communication in the presence of a jamming adversary where quadratic power constraints are imposed on the transmitter and the jammer. The jamming signal is allowed to be a function of the codebook, and a noncausal but noisy observation of the transmitted codeword. For a certain range of the noise-to-signal ratios (NSRs) of the transmitter and the jammer, we are able to characterize the capacity of this channel under deterministic encoding or stochastic encoding, i.e., with no common randomness between the encoder/decoder pair. For the remaining NSR regimes, we determine the capacity under the assumption of a small amount of common randomness (at most 2log(n) bits in one sub-regime, and at most Ω(n) bits in the other sub-regime) available to the encoder-decoder pair. Our proof techniques involve a novel myopic list-decoding result for achievability, and a Plotkin-type push attack for the converse in a subregion of the NSRs, both of which may be of independent interest. We also give bounds on the strong secrecy capacity of this channel assuming that the jammer is simultaneously eavesdropping."}],"publication":"IEEE Transactions on Information Theory","publisher":"Institute of Electrical and Electronics Engineers","user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","status":"public","publication_identifier":{"issn":["0018-9448"],"eissn":["1557-9654"]},"author":[{"first_name":"Yihan","last_name":"Zhang","full_name":"Zhang, Yihan","id":"2ce5da42-b2ea-11eb-bba5-9f264e9d002c"},{"last_name":"Vatedka","first_name":"Shashank","full_name":"Vatedka, Shashank"},{"first_name":"Sidharth","last_name":"Jaggi","full_name":"Jaggi, Sidharth"},{"first_name":"Anand D.","last_name":"Sarwate","full_name":"Sarwate, Anand D."}],"issue":"8","date_published":"2022-08-01T00:00:00Z","language":[{"iso":"eng"}],"article_processing_charge":"No"}