An overview of information-theoretic security and privacy: Metrics, limits and applications

M Bloch, O Günlü, A Yener, F Oggier… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …

[KNIHA][B] The nature of physical computation

O Shagrir - 2022 - library.oapen.org
Computing systems are everywhere today. Even the brain is thought to be a sort of
computing system. But what does it mean to say that a given organ or system computes …

[HTML][HTML] Robert Rosen's relational biology theory and his emphasis on non-algorithmic approaches to living systems

PA Lane - Mathematics, 2024 - mdpi.com
This paper examines the use of algorithms and non-algorithmic models in mathematics and
science, especially in biology, during the past century by summarizing the gradual …

Computably compact metric spaces

RG Downey, AG Melnikov - Bulletin of Symbolic Logic, 2023 - cambridge.org
We give a systematic technical exposition of the foundations of the theory of computably
compact metric spaces. We discover several new characterizations of computable …

[KNIHA][B] Handbook of computability and complexity in analysis

V Brattka, P Hertling - 2021 - Springer
Computable analysis is the theory of computability and complexity in analysis that arose out
of Turing's seminal work [22, 23] in the 1930s. Turing's work was motivated by questions …

Denial-of-service attacks on communication systems: Detectability and jammer knowledge

H Boche, RF Schaefer, HV Poor - IEEE Transactions on Signal …, 2020 - ieeexplore.ieee.org
Wireless communication systems are inherently vulnerable to intentional jamming. In this
paper, two classes of such jammers are considered: those with partial and full knowledge …

Limitations of deep learning for inverse problems on digital hardware

H Boche, A Fono, G Kutyniok - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Deep neural networks have seen tremendous success over the last years. Since the training
is performed on digital hardware, in this paper, we analyze what actually can be computed …

Algorithmic computability and approximability of capacity-achieving input distributions

H Boche, RF Schaefer, HV Poor - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The capacity of a channel can usually be characterized as a maximization of certain entropic
quantities. From a practical point of view it is of primary interest to not only compute the …

[KNIHA][B] Identification and other probabilistic models

R Ahlswede, A Ahlswede - 2021 - Springer
After an introduction to classical information theory, we present now primarily own methods
and models, which go considerably beyond it. They were also sketched in our Shannon …

[HTML][HTML] Inverse problems are solvable on real number signal processing hardware

H Boche, A Fono, G Kutyniok - Applied and Computational Harmonic …, 2025 - Elsevier
Despite the success of Deep Learning (DL) serious reliability issues such as non-robustness
persist. An interesting aspect is, whether these problems arise due to insufficient tools or …