Follow
Asaf Cohen
Asaf Cohen
Verified email at bgu.ac.il - Homepage
Title
Cited by
Cited by
Year
Electrical network frequency (ENF) maximum-likelihood estimation via a multitone harmonic model
D Bykhovsky, A Cohen
IEEE Transactions on Information Forensics and Security 8 (5), 744-753, 2013
692013
Multi-antenna jamming in covert communication
O Shmuel, A Cohen, O Gurewitz
IEEE Transactions on Communications 69 (7), 4644-4658, 2021
562021
Lower bounds on the error probability of block codes based on improvements on de Caen's inequality
A Cohen, N Merhav
IEEE Transactions on Information Theory 50 (2), 290-310, 2004
492004
Why botnets work: Distributed brute-force attacks need no synchronization
S Salamatian, W Huleihel, A Beirami, A Cohen, M Médard
IEEE Transactions on Information Forensics and Security 14 (9), 2288-2299, 2019
462019
Universal randomized guessing with application to asynchronous decentralized brute–force attacks
N Merhav, A Cohen
IEEE Transactions on Information Theory 66 (1), 114-129, 2019
432019
Efficient data collection over multiple access wireless sensors network
A Cohen, A Cohen, O Gurewitz
IEEE/ACM Transactions on Networking 28 (2), 491-504, 2020
39*2020
Privacy-Aware Distributed Hypothesis Testing
S Sreekumar, A Cohen, D Gündüz
Entropy 22 (6), 2020
35*2020
Traffic classification based on zero-length packets
J Kampeas, A Cohen, O Gurewitz
IEEE Transactions on Network and Service Management 15 (3), 1049-1062, 2018
302018
Wiretap channel with causal state information and secure rate-limited feedback
A Cohen, A Cohen
IEEE Transactions on Communications 64 (3), 1192-1203, 2016
262016
Centralized vs decentralized targeted brute-force attacks: Guessing with side-information
S Salamatian, W Huleihel, A Beirami, A Cohen, M Médard
IEEE Transactions on Information Forensics and Security 15, 3749-3759, 2020
25*2020
Distributed inter-cell interference mitigation via joint scheduling and power control under noise rise constraints
E Biton, A Cohen, G Reina, O Gurewitz
IEEE transactions on wireless communications 13 (6), 3464-3477, 2014
242014
Secure group testing
A Cohen, A Cohen, O Gurewitz
IEEE Transactions on Information Forensics and Security 16, 4003-4018, 2020
22*2020
Secure multi-source multicast
A Cohen, A Cohen, M Medard, O Gurewitz
IEEE Transactions on Communications 67 (1), 708-723, 2018
22*2018
Anomaly detection for individual sequences with applications in identifying malicious tools
S Siboni, A Cohen
Entropy 22 (6), 649, 2020
21*2020
When physics meets signal processing: Image and video denoising based on Ising theory
E Cohen, R Heiman, M Carmi, O Hadar, A Cohen
Signal Processing: Image Communication 34, 14-21, 2015
20*2015
Capacity of distributed opportunistic scheduling in nonhomogeneous networks
J Kampeas, A Cohen, O Gurewitz
IEEE Transactions on Information Theory 60 (11), 7231-7247, 2014
20*2014
SINR diagram with interference cancellation
C Avin, A Cohen, Y Haddad, E Kantor, Z Lotker, M Parter, D Peleg
Ad Hoc Networks 54, 1-16, 2017
18*2017
Scanning and Sequential Decision Making for Multidimensional Data–Part I: The Noiseless Case
A Cohen, N Merhav, T Weissman
IEEE transactions on information theory 53 (9), 3001-3020, 2007
18*2007
Scanning and sequential decision making for multidimensional data—Part II: The noisy case
A Cohen, T Weissman, N Merhav
IEEE transactions on information theory 54 (12), 5609-5631, 2008
162008
Network coding based information spreading in dynamic networks with correlated data
A Cohen, B Haeupler, C Avin, M Médard
IEEE Journal on Selected Areas in Communications 33 (2), 213-224, 2014
13*2014
The system can't perform the operation now. Try again later.
Articles 1–20