Foto von Moritz Wiese

Dr. rer. nat. Moritz Wiese

  • Tel.: +49 (89) 289 - 23246
  • Raum: 0104.04.411
  • wiese(at)tum.de

Publications

Book chapters:

  1. J. Nötzel, M. Wiese and H. Boche. „The discrete memoryless arbitrarily varying wiretap channel“, in Schaefer, R. et al. (Hrsg.), Information Theoretic Security and Privacy of Information Systems, Cambridge University Press, 2017.
  2. M. Wiese and H. Boche. “Strong secrecy for multiple access channels”, in Aydinian, H. et al. (eds.), Information theory, combinatorics, and search theory. In memory of Rudolf Ahlswede, Berlin: Springer. Lecture Notes in Computer Science 7777, 71-122, 2013.

Journal papers:

  1. M. Wiese, T. J. Oechtering, K. H. Johansson, P. Papadimitratos, H. Sandberg and M. Skoglund, „Secure Estimation and Zero-Error Secrecy Capacity." IEEE Transactions on Automatic Control, 64(3), 2019.
  2. M. Wiese, J. Nötzel and H. Boche. “A Channel Under Simultaneous Jamming and Eavesdropping Attack—Correlated Random Coding Capacities Under Strong Secrecy Criteria.” IEEE Transactions on Information Theory, 62(7):3844–3862, 2016.
  3. J. Nötzel, M. Wiese and H. Boche. “The Arbitrarily Varying Wiretap Channel—Secret Randomness, Stability, and Super-Activation.” IEEE Transactions on Information Theory, 62(6):3504–3531, 2016.
  4. M. Wiese and H. Boche. “On the Weakest Resource for Coordination in Arbitrarily Varying Multiple Access Channels with Conferencing Encoders.” Problems of Information Transmission, 50(1):15-26, 2014.
  5. M. Wiese and H. Boche. “The arbitrarily varying multiple-access channel with conferencing encoders.” IEEE Transactions on Information Theory, 59(3):1405–1416, 2013.
  6. R.F. Wyrembelski, M. Wiese and H. Boche. “Strong secrecy in bidirectional broadcast channels with confidential messages.” IEEE Transactions on Information Forensics and Security, 8(2):324–334, 2013.
  7. H. Boche, B. Farrell, M. Ledoux and M. Wiese. “Expected supremum of a random linear combination of shifted kernels.” Journal of Fourier Analysis and Applications, 18(4):790–802, 2012.
  8. M. Wiese, H. Boche, I. Bjelaković and V. Jungnickel. “The compound multiple access channel with partially cooperating encoders.” IEEE Transactions on Information Theory, 57(5):3045–3066, 2011.

Conferences:

  1. M. Wiese and H. Boche. "A Graph-Based Modular Coding Scheme Which Achieves Semantic Security." In Proc. 2019 IEEE International Symposium on Information Theory, 2019.
  2. M. Wiese, K. H. Johansson, T. J. Oechtering, P. Papadimitratos, H. Sandberg and M. Skoglund. “Secure Estimation for Unstable Systems.” In Proc. 55th IEEE Conference on Decision and Control, 2016.
  3. M. T. Vu, T. J. Oechtering, M. Wiese, M. Skoglund, "Successive refinement with cribbing and side information." In Proc. 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2016.
  4. M. Wiese, K. H. Johansson, T. J. Oechtering, P. Papadimitratos, H. Sandberg and M. Skoglund. “Uncertain Wiretap Channels and Secure Estimation.” In Proc. 2016 IEEE International Symposium on Information Theory, 2016.
  5. M. Wiese and P. Papadimitratos. “Frequency hopping does not increase anti-jamming resilience of wireless channels.” In Proc. 2016 International Zurich Seminar on Communications, 2016.
  6. C. Janda, M. Wiese, J. Nötzel, H. Boche and E. Jorswieck. “Wiretap-Channels under Constrained Active and Passive Attacks.” In Proc. IEEE Conference on Communications and Network Security: Workshop on Physical-layer Methods for Wireless Security, 2015.
  7. M. Wiese, J. Nötzel and H. Boche. “The Arbitrarily Varying Wiretap Channel – Communication under Uncoordinated Attacks.” In Proc. 2015 IEEE International Symposium on Information Theory, 2015.
  8. J. Nötzel, M. Wiese and H. Boche. “The Arbitrarily Varying Wiretap Channel – Secret Randomness, Stability and Super-Activation.” In Proc. 2015 IEEE International Symposium on Information Theory, 2015.
  9. M. Wiese and H. Boche. “On the Weakest Resource for Coordination in AV-MACs with Conferencing Encoders.” In Proc. 2013 IEEE Information Theory Workshop, 2013.
  10. M. Wiese and H. Boche. “An achievable region for the wiretap multiple-access channel with common message.” In Proc. 2012 IEEE International Symposium on Information Theory, pages 249–253, 2012.
  11. R.F. Wyrembelski, M. Wiese and H. Boche. “Strong secrecy in bidirectional relay networks.” In Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers, pages 217–221, 2011.
  12. M. Wiese and H. Boche. “The arbitrarily varying multiple-access channel with conferencing encoders.” In Proc. 2011 IEEE International Symposium on Information Theory, pages 993–997, 2011.
  13. M. Wiese, H. Boche and I. Bjelakovic. “The compound MAC with common message and partial channel state information.” In Proc. 2010 International Symposium on Information Theory and its Applications, pages 416–421, 2010.
  14. M. Wiese, F. Knabe, J.G. Klotz and A. Sezgin. “The performance of QPSK in low-SNR interference channels.” In Proc. 2010 International Symposium on Information Theory and its Applications, pages 708–713, 2010.
  15. M. Wiese, H. Boche, I. Bjelakovic and V. Jungnickel. “Downlink with partially cooperating base stations.” In Proc. 2010 IEEE Eleventh International Workshop on Signal Processing Advances in Wireless Communications, pages 1–5, 2010.
  16. F. Knabe, M. Wiese, C. Huppert and J.G. Klotz. “The wideband slope region of BPSK and QPSK for broadcast channels in the low-power regime.” In Proc. 2009 IEEE Information Theory Workshop, pages 440–444, 2009.
  17. M. Wiese, A. Giovanidis and G. Wunder. “Optimal power allocation policies for the reliable transmission of a single packet via ARQ protocols.” In Proc. 2008 42nd Asilomar Conference on Signals, Systems and Computers, pages 475–479, 2008.