Wafa Labidi

Wafa Labidi
  • Master of Science
  • PhD Student at Technical University of Munich

PhD Student

About

26
Publications
530
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
163
Citations
Introduction
Post-Shannon Theory, Identification, Secure Identification
Current institution
Technical University of Munich
Current position
  • PhD Student

Publications

Publications (26)
Chapter
Common randomness (CR), as a resource, is not commonly exploited in existing practical communication systems. In the CR generation framework, both the sender and receiver aim to generate a common random variable observable to both, ideally with low error probability. The availability of this CR allows us to implement correlated random protocols tha...
Chapter
The model of identification via channels, introduced by Ahlswede and Dueck, has attracted increasing attention in recent years. Unlike in Shannon’s classical model, where the receiver aims to determine which message was sent from a set of M messages, message identification focuses solely on discerning whether a specific message m was transmitted. T...
Chapter
New applications in modern communications are demanding robust and ultra-reliable low-latency information exchange such as machine-to-machine and human-to-machine communications. For many of these applications, the identification approach of Ahlswede and Dueck is much more efficient than the classical message transmission scheme proposed by Shannon...
Chapter
Sadly, our esteemed colleague and friend Ning Cai passed away on 25th May, 2023. In his memory, Ingo Althöfer, Holger Boche, Christian Deppe, Jens Stoye, Ulrich Tamm, Andreas Winter, and Raymond Yeung organized the “Workshop on Information Theory and Related Fields” at the Bielefeld ZiF (Center for Interdisciplinary Research). This special event wa...
Preprint
Molecular communication (MC) is an emerging paradigm that enables data transmission through biochemical signals rather than traditional electromagnetic waves. This approach is particularly promising for environments where conventional wireless communication is impractical, such as within the human body. However, security and privacy pose significan...
Article
Full-text available
In the identification (ID) scheme proposed by Ahlswede and Dueck, the receiver’s goal is simply to verify whether a specific message of interest was sent. Unlike Shannon’s transmission codes, which aim for message decoding, ID codes for a discrete memoryless channel (DMC) are far more efficient; their size grows doubly exponentially with the blockl...
Preprint
In contrast to Shannon transmission codes, the size of identification (ID) codes for discrete memoryless channels (DMCs) experiences doubly exponential growth with the block length when randomized encoding is used. Additional enhancements within the ID paradigm can be realized through supplementary resources such as quantum entanglement, common ran...
Preprint
We investigate message identification over a K-sender Gaussian multiple access channel (K-GMAC). Unlike conventional Shannon transmission codes, the size of randomized identification (ID) codes experiences a doubly exponential growth in the code length. Improvements in the ID approach can be attained through additional resources such as quantum ent...
Preprint
Sadly, our esteemed colleague and friend Ning Cai passed away on 25th May, 2023. In his memory, Ingo Alth\"ofer, Holger Boche, Christian Deppe, Jens Stoye, Ulrich Tamm, Andreas Winter, and Raymond Yeung have organized the "Workshop on Information Theory and Related Fields" at the Bielefeld ZiF (Center for Interdisciplinary Research). This special e...
Preprint
There is a growing interest in models that extend beyond Shannon's classical transmission scheme, renowned for its channel capacity formula $C$. One such promising direction is message identification via channels, introduced by Ahlswede and Dueck. Unlike in Shannon's classical model, where the receiver aims to determine which message was sent from...
Preprint
In the identification (ID) scheme proposed by Ahlswede and Dueck, the receiver only checks whether a message of special interest to him has been sent or not. In contrast to Shannon transmission codes, the size of ID codes for a Discrete Memoryless Channel (DMC) grows doubly exponentially fast with the blocklength, if randomized encoding is used. Th...
Preprint
We study a standard two-source model for common randomness (CR) generation in which Alice and Bob generate a common random variable with high probability of agreement by observing independent and identically distributed (i.i.d.) samples of correlated sources on countably infinite alphabets. The two parties are additionally allowed to communicate as...
Preprint
Full-text available
We study the problem of common randomness (CR) generation in the basic two-party communication setting in which the sender and the receiver aim to agree on a common random variable with high probability by observing independent and identically distributed (i.i.d.) samples of correlated Gaussian sources and while communicating as little as possible...
Article
We analyze deterministic message identification via channels with non-discrete additive white noise and with a noiseless feedback link under both average power and peak power constraints. The identification task is part of Post Shannon Theory. The consideration of communication systems beyond Shannon’s approach is useful in order to increase the ef...
Chapter
Due to an unfortunate oversight incorrect information was captured online regarding the authorship of chapters “Testing of Hypotheses and Identification” and “New Results in Identification Theory”.
Preprint
Full-text available
Identification is a communication paradigm that promises some exponential advantages over transmission for applications that do not actually require all messages to be reliably transmitted, but where only few selected messages are important. Notably, the identification capacity theorems prove the identification is capable of exponentially larger ra...
Preprint
Full-text available
We analyze message identification via Gaussian channels with noiseless feedback, which is part of the Post Shannon theory. The consideration of communication systems beyond Shannon's approach is useful to increase the efficiency of information transmission for certain applications. We consider the Gaussian channel with feedback. If the noise varian...
Preprint
Full-text available
New applications in modern communications are demanding robust and ultra-reliable low latency information exchange such as machine-to-machine and human-to-machine communications. For many of these applications, the identification approach of Ahlswede and Dueck is much more efficient than the classical message transmission scheme proposed by Shannon...
Preprint
Full-text available
Common randomness (CR), as a resource, is not commonly used in existing practical communication systems. In the common randomness framework, both sender and receiver aim to generate a common random variable observable to both, ideally with low error probability. The knowledge of this CR allows us to implement correlated random protocols that can le...

Network

Cited By