![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Ersen Ekrem
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [j17]Omur Ozel
, Ersen Ekrem, Sennur Ulukus:
Gaussian Wiretap Channel With Amplitude and Variance Constraints. IEEE Trans. Inf. Theory 61(10): 5553-5563 (2015) - 2014
- [j16]Ersen Ekrem, Sennur Ulukus:
An Outer Bound for the Vector Gaussian CEO Problem. IEEE Trans. Inf. Theory 60(11): 6870-6887 (2014) - 2013
- [j15]Raef Bassily, Ersen Ekrem, Xiang He, Ender Tekin, Jianwei Xie, Matthieu R. Bloch, Sennur Ulukus, Aylin Yener:
Cooperative Security at the Physical Layer: A Summary of Recent Advances. IEEE Signal Process. Mag. 30(5): 16-28 (2013) - [j14]Ersen Ekrem, Sennur Ulukus:
Multi-Receiver Wiretap Channel With Public and Confidential Messages. IEEE Trans. Inf. Theory 59(4): 2165-2177 (2013) - [j13]Ersen Ekrem, Sennur Ulukus:
Secure Lossy Transmission of Vector Gaussian Sources. IEEE Trans. Inf. Theory 59(9): 5466-5487 (2013) - 2012
- [b1]Ersen Ekrem:
Information-theoretic Secrecy in Multi-user Channels. University of Maryland, College Park, MD, USA, 2012 - [j12]Ersen Ekrem, Sennur Ulukus:
An Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel. IEEE Trans. Inf. Theory 58(4): 2427-2433 (2012) - [j11]Ersen Ekrem, Sennur Ulukus:
Capacity Region of Gaussian MIMO Broadcast Channels With Common and Confidential Messages. IEEE Trans. Inf. Theory 58(9): 5669-5680 (2012) - [j10]Ersen Ekrem, Sennur Ulukus:
Degraded Compound Multi-Receiver Wiretap Channels. IEEE Trans. Inf. Theory 58(9): 5681-5698 (2012) - [j9]Ersen Ekrem, Sennur Ulukus:
Capacity-Equivocation Region of the Gaussian MIMO Wiretap Channel. IEEE Trans. Inf. Theory 58(9): 5699-5710 (2012) - [j8]Ersen Ekrem, Sennur Ulukus:
An Outer Bound for the Gaussian MIMO Broadcast Channel With Common and Private Messages. IEEE Trans. Inf. Theory 58(11): 6766-6772 (2012) - [c23]Ersen Ekrem, Sennur Ulukus:
An outer bound for the vector Gaussian CEO problem. ISIT 2012: 576-580 - [c22]Omur Ozel, Ersen Ekrem, Sennur Ulukus:
Gaussian wiretap channel with a batteryless energy harvesting transmitter. ITW 2012: 89-93 - [c21]Omur Ozel, Ersen Ekrem, Sennur Ulukus:
Gaussian wiretap channel with an amplitude constraint. ITW 2012: 139-143 - [i12]Ersen Ekrem, Sennur Ulukus:
An Outer Bound for the Vector Gaussian CEO Problem. CoRR abs/1202.0536 (2012) - 2011
- [j7]Ersen Ekrem, Sennur Ulukus:
Secrecy in Cooperative Relay Broadcast Channels. IEEE Trans. Inf. Theory 57(1): 137-155 (2011) - [j6]Ersen Ekrem, Sennur Ulukus:
The Secrecy Capacity Region of the Gaussian MIMO Multi-Receiver Wiretap Channel. IEEE Trans. Inf. Theory 57(4): 2083-2114 (2011) - [c20]Ersen Ekrem, Sennur Ulukus:
Secure lossy source coding with side information. Allerton 2011: 1098-1105 - [c19]Ersen Ekrem, Sennur Ulukus:
Secure lossy transmission of vector Gaussian sources. ISIT 2011: 573-577 - [i11]Ersen Ekrem, Sennur Ulukus:
Degrees of Freedom Region of the Gaussian MIMO Broadcast Channel with Common and Private Messages. CoRR abs/1106.2522 (2011) - [i10]Ersen Ekrem, Sennur Ulukus:
Multi-receiver Wiretap Channel with Public and Confidential Messages. CoRR abs/1106.4286 (2011) - [i9]Ersen Ekrem, Sennur Ulukus:
Secure Lossy Transmission of Vector Gaussian Sources. CoRR abs/1108.3544 (2011) - 2010
- [j5]Ersen Ekrem, Sennur Ulukus:
Secure broadcasting using multiple antennas. J. Commun. Networks 12(5): 411-432 (2010) - [j4]Ozgur Dalkilic, Ersen Ekrem, S. Eray Varlik, Mehmet Kivanç Mihçak:
A Detection Theoretic Approach to Digital Fingerprinting With Focused Receivers Under Uniform Linear Averaging Gaussian Attacks. IEEE Trans. Inf. Forensics Secur. 5(4): 658-669 (2010) - [j3]Ersen Ekrem, Mutlu Koca, Hakan Deliç:
Iterative Synchronization of Multiuser Ultra-Wideband Signals. IEEE Trans. Wirel. Commun. 9(10): 3040-3051 (2010) - [c18]Ersen Ekrem, Sennur Ulukus:
Degraded Gaussian MIMO multi-receiver wiretap channel with public and confidential messages. Allerton 2010: 1236-1243 - [c17]Ersen Ekrem, Sennur Ulukus:
On Gaussian MIMO compound wiretap channels. CISS 2010: 1-6 - [c16]Ersen Ekrem, Sennur Ulukus:
Degrees of Freedom Region of the Gaussian MIMO Broadcast Channel with Common and Private Messages. GLOBECOM 2010: 1-5 - [c15]Ersen Ekrem, Sennur Ulukus:
On Gaussian MIMO broadcast channels with common and private messages. ISIT 2010: 565-569 - [c14]Ersen Ekrem, Sennur Ulukus:
Gaussian MIMO broadcast channels with common and confidential messages. ISIT 2010: 2583-2587 - [c13]Ersen Ekrem, Sennur Ulukus:
Transmission of common, public and confidential messages in broadcast channels with multiple antennas. PIMRC 2010: 2675-2680 - [i8]Ersen Ekrem, Sennur Ulukus:
Gaussian MIMO Broadcast Channels with Common and Confidential Messages. CoRR abs/1001.3297 (2010) - [i7]Ersen Ekrem, Sennur Ulukus:
An Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel. CoRR abs/1002.4022 (2010) - [i6]Ersen Ekrem, Sennur Ulukus:
Capacity Region of Gaussian MIMO Broadcast Channels with Common and Confidential Messages. CoRR abs/1002.5026 (2010) - [i5]Ersen Ekrem, Sennur Ulukus:
Capacity-Equivocation Region of the Gaussian MIMO Wiretap Channel. CoRR abs/1005.0419 (2010)
2000 – 2009
- 2009
- [j2]Ersen Ekrem, Sennur Ulukus:
Secrecy Capacity of a Class of Broadcast Channels with an Eavesdropper. EURASIP J. Wirel. Commun. Netw. 2009 (2009) - [c12]Ozgur Dalkilic, Ersen Ekrem, S. Eray Varlik, M. Kivanç Mihçak:
A detection theoretic approach to digital fingerprinting with focused receivers under uniform linear averaging Gaussian attacks. Allerton 2009: 1270-1277 - [c11]Ersen Ekrem, Sennur Ulukus:
Secrecy capacity region of the degraded compound multi-receiver wiretap channel. Allerton 2009: 1278-1285 - [c10]Ersen Ekrem, Sennur Ulukus:
Gaussian MIMO Multi-Receiver Wiretap Channel. GLOBECOM 2009: 1-6 - [c9]Ersen Ekrem, Sennur Ulukus:
Ergodic Secrecy Capacity Region of the Fading Broadcast Channel. ICC 2009: 1-5 - [c8]Ersen Ekrem, Sennur Ulukus:
Secrecy capacity region of the Gaussian multi-receiver wiretap channel. ISIT 2009: 2612-2616 - [i4]Ersen Ekrem, Sennur Ulukus:
The Secrecy Capacity Region of the Gaussian MIMO Multi-receiver Wiretap Channel. CoRR abs/0903.3096 (2009) - [i3]Ersen Ekrem, Sennur Ulukus:
Degraded Compound Multi-receiver Wiretap Channels. CoRR abs/0910.3033 (2009) - 2008
- [j1]Ersen Ekrem, Mutlu Koca, Hakan Deliç:
Robust Ultra-Wideband Signal Acquisition. IEEE Trans. Wirel. Commun. 7(11-2): 4656-4669 (2008) - [c7]Ersen Ekrem, Sennur Ulukus:
On secure broadcasting. ACSCC 2008: 676-680 - [c6]Ersen Ekrem, Sennur Ulukus:
On the secrecy of multiple access wiretap channel. Allerton 2008: 1014-1021 - [c5]Ersen Ekrem, Sennur Ulukus:
Effects of cooperation on the secrecy of multiple access channels with generalized feedback. CISS 2008: 791-796 - [c4]Ersen Ekrem, Sennur Ulukus:
Secrecy in cooperative relay broadcast channels. ISIT 2008: 2217-2221 - [i2]Ersen Ekrem, Sennur Ulukus:
Secrecy in Cooperative Relay Broadcast Channels. CoRR abs/0811.1317 (2008) - [i1]Ersen Ekrem, Sennur Ulukus:
Secrecy Capacity of a Class of Broadcast Channels with an Eavesdropper. CoRR abs/0812.0319 (2008) - 2007
- [c3]Ersen Ekrem, Mutlu Koca, Hakan Deliç:
Robust frequency-domain channel estimation and detection for ultra-wideband signals under non-Gaussian noise. EUSIPCO 2007: 2040-2044 - [c2]Ersen Ekrem, Mutlu Koca, Hakan Deliç:
Ultra-Wideband Signal Acquisition in Non-Gaussian Noise via Successive Sampling. VTC Spring 2007: 1801-1805 - [c1]Ersen Ekrem, Mutlu Koca, Hakan Deliç:
Robust Acquisition of Ultra-Wideband Signals with Averaged Template. WCNC 2007: 1653-1658
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint