Projects per year
Fingerprint
Dive into the research topics where Joerg Kliewer is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
- 1 Similar Profiles
Network
Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
Projects
- 7 Finished
-
Collaborative Research: Ccss: Coding For 5G And Beyond: Limits And Efficient Algorithms
9/1/17 → 8/31/20
New Jersey Institute of Technology
Project: Research project
-
Keyless Authentication for AWGN Channels
Graves, E., Beemer, A., Kliewer, J., Kosut, O. & Yu, P. L., Jan 1 2023, In: IEEE Transactions on Information Theory. 69, 1, p. 496-519 24 p.New Jersey Institute of Technology
Research output: Contribution to journal › Article › peer-review
-
Straggler- and Adversary-Tolerant Secure Distributed Matrix Multiplication Using Polynomial Codes
Byrne, E., Gnilke, O. W. & Kliewer, J., Feb 2023, In: Entropy. 25, 2, 266.New Jersey Institute of Technology
Research output: Contribution to journal › Article › peer-review
Open Access -
Code Constructions and Bounds for Identification via Channels
Gunlu, O., Kliewer, J., Schaefer, R. F. & Sidorenko, V., Mar 1 2022, In: IEEE Transactions on Communications. 70, 3, p. 1486-1496 11 p.New Jersey Institute of Technology
Research output: Contribution to journal › Article › peer-review
Open Access -
Function Computation Without Secure Links: Information and Leakage Rates
Chou, R. A. & Kliewer, J., 2022, 2022 IEEE International Symposium on Information Theory, ISIT 2022. Institute of Electrical and Electronics Engineers Inc., p. 1223-1228 6 p. (IEEE International Symposium on Information Theory - Proceedings; vol. 2022-June).New Jersey Institute of Technology
Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
-
Generative Adversarial User Privacy in Lossy Single-Server Information Retrieval
Weng, C. W., Yakimenka, Y., Lin, H. Y., Rosnes, E. & Kliewer, J., 2022, In: IEEE Transactions on Information Forensics and Security. 17, p. 3495-3510 16 p.New Jersey Institute of Technology
Research output: Contribution to journal › Article › peer-review