Importance sampling is a central idea underlying off-policy prediction i...
A central challenge to applying many off-policy reinforcement learning
a...
A variety of theoretically-sound policy gradient algorithms exist for th...
This work establishes that the physical layer can be used to perform
inf...
We consider keyless authentication for point-to-point communication in t...
This paper investigates the secret key authentication capacity region.
S...
This paper investigates the secret key authentication capacity region.
S...
We construct a modular scheme which extends codes for wiretap channels o...
A basic information theoretic model for summarization is formulated. Her...
Policy gradient methods are widely used for control in reinforcement
lea...
This work constructs a discrete random variable that, when conditioned u...
The rate regions of many variations of the standard and wire-tap channel...
This paper employs equal-image-size source partitioning techniques to de...
If Alice must communicate with Bob over a channel shared with the advers...
This paper introduces equal-image-size source partitioning, a new tool f...
In this paper we investigate the image size characterization problem. We...
This paper presents a random coding scheme with which two nodes can exch...
This paper studies the problem of detecting a potential malicious relay ...