Overview

Rémi A. Chou received the Engineering degree from Supélec, Gif-sur-Yvette, France in 2011. He received the M.S. degree and Ph.D. degree in Electrical Engineering from the Georgia Institute of Technology, Atlanta, in 2011 and 2015, respectively. Between 2015 and 2017, he was a postdoctoral research associate at the Pennsylvania State University, University Park, PA. He joined the Electrical Engineering and Computer Science Department at Wichita State University as an Assistant Professor in 2017. His current research interest includes information theory, secure communication, cyber-physical security, and machine learning.

Information

Academic Interests and Expertise

Research Areas

  • Information theory

  • Secure communication

  • Cyber-physical security

  • Machine learning

Education

  • Ph.D. in Electrical Engineering, Georgia Institute of Technology, USA (2015)
  • M.S. in Electrical Engineering, Georgia Institute of Technology, USA (2011)
  • M.S. in Engineering, Ecole Supérieure d'Electricité, Gif-sur-Yvette, France (2011)
Areas of Teaching Interest

CS 737 - Wireless Networking (Fall 2017)

EE 877AA - Information Theoretic Security (Spring 2018)

CS 898AY - Sequential Decision Problems (Fall 2018)

CS 731 - Mathematical Foundations of Computer Networking (Spring 2019)

CS 464 - Computer Networks (Fall 2019)

CS 736 - Data Communication Networks (Fall 2019)

Publications

Journal Papers

  1. R. Chou, A. Yener, Gaussian Wiretap Channel Models when the Eavesdropper can Arbitrarily Jam, Submitted to IEEE Transactions on Information Theory, Jun. 2019.
  2. R. Chou, M. Bloch, A. Yener, Universal Covertness for Discrete Memoryless Sources, Submitted to IEEE Transactions on Information Theory, Jul 2018.
  3. R. Chou, A. Yener, Strongly Secure Multiuser Communication and Authentication with Anonymity Constraints, Accepted to IEEE Transactions on Information Theory, Sep. 2019.
  4. R. Chou, A. Yener, Secret-Key Generation in Many-to-One Networks: An Integrated Game-Theoretic and Information-Theoretic Approach, IEEE Transactions on Information Theory, 65(8), pp. 5144 - 5159, Aug. 2019.
  5. R. Chou, A. Yener, Polar Coding for the Multiple Access Wiretap Channel via Rate-Splitting and Cooperative Jamming, IEEE Transactions on Information Theory, 64(12), pp. 7903 - 7921, Dec. 2018.
  6. R. Chou, M. Bloch, J. Kliewer, Empirical and Strong Coordination via Soft Covering with Polar Codes, IEEE Transactions on Information Theory, 64(7), pp. 5087 - 5100, Jul. 2018.
  7. R. Chou, B. Vellambi, M. Bloch, J. Kliewer, Coding Schemes for Achieving Strong Secrecy at Negligible Cost, IEEE Transactions on Information Theory, 63(3), pp. 1858 - 1873, Mar. 2017.
  8. R. Chou, M. Bloch, Polar Coding for the Broadcast Channel with Confidential Messages: A Random Binning Analogy, IEEE Transactions on Information Theory, 62(5), pp. 2410 - 2429, May 2016.
  9. R. Chou, M. Bloch, E. Abbe, Polar Coding for Secret-Key Generation, IEEE Transactions on Information Theory, 61(11), pp. 6213 - 6237, Nov. 2015.
  10. R. Chou, M. Bloch, Separation of Reliability and Secrecy in Rate-Limited Secret-Key Generation, IEEE Transactions on Information Theory, 60(8), pp. 4941 - 4957, Aug. 2014.

Conference Papers

  1. R. Sultana, R. ChouExplicit Low-complexity Codes for Multiple Access Channel Resolvability, Proc. of the 57nd Annual Allerton Conference on Communication, Control, and Computing, Allerton’19, Monticello, IL, Sep. 2019.
  2. R. ChouBiometric Systems with Multiuser Access Structures, Proc. of the IEEE International Symposium on Information Theory, ISIT’19, Paris, France, Jul. 2019.
  3. R. Chou, A. Yener, The Degraded Gaussian Many-Access Wiretap Channel, Proc. of the IEEE International Symposium on Information Theory, ISIT’19, Paris, France, Jul. 2019.
  4. R. ChouSecret Sharing over a Public Channel from Correlated Random Variables, Proc. of the IEEE International Symposium on Information Theory, ISIT’18, Vail, CO, Jun. 2018.
  5. R. ChouExplicit Codes for the Wiretap Channel with Uncertainty on the Eavesdropper's Channel, Proc. of the IEEE International Symposium on Information Theory, ISIT’18, Vail, CO, Jun. 2018.
  6. T. Zewde, R. Chou, M. C. Gursoy, Optimal Resource Allocation for SWIPT with Full-Duplex Operation and Secrecy, Proc. of the IEEE International Conference on Communications: Workshop on Energy Harvesting Wireless Communications, Kansas City, MO, May 2018.
  7. R. Chou, A. Yener, A Game Theoretic Treatment for Pair-wise Secret-Key Generation in Many-to-One Networks, Proc. of the IEEE International Symposium on Information Theory, ISIT’17, Aachen, Germany, Jun. 2017.
  8. R. Chou, A. Yener, The Degraded Gaussian Multiple Access Wiretap Channel with Selfish Transmitters: A Coalitional Game Theory Perspective, Proc. of the IEEE International Symposium on Information Theory, ISIT’17, Aachen, Germany, Jun. 2017.
  9. R. Chou, A. Yener, The Gaussian Multiple Access Wiretap Channel when the Eavesdropper can Arbitrarily Jam, Proc. of the IEEE International Symposium on Information Theory, ISIT’17, Aachen, Germany, Jun. 2017.
  10. R. Chou, M. Bloch, A. Yener, Universal Covertness for Discrete Memoryless Sources, Proc. of the 54th Annual Allerton Conference on Communication, Control, and Computing, Allerton’16, Monticello, IL, Sep. 2016.
  11. R. Chou, A. Yener, Multiuser Authentication with Anonymity Constraints over Noisy Channels, Proc. of the IEEE International Symposium on Information Theory, ISIT’16, Barcelona, Spain, Jul. 2016.
  12. R. Chou, A. Yener, Polar Coding for the Multiple Access Wiretap Channel via Rate-Splitting and Cooperative Jamming, Proc. of the IEEE International Symposium on Information Theory, ISIT’16, Barcelona, Spain, Jul. 2016.
  13. Chou, M. Bloch, Using Deterministic Decisions for Low-Entropy Bits in the Encoding and Decoding of Polar Codes, Proc. of the 53nd Annual Allerton Conference on Communication, Control, and Computing, Allerton’15, Monticello, IL, Oct. 2015.
  14. Chou, M. Bloch, J. Kliewer, Polar Coding for Empirical and Strong Coordination via Distribution Approximation, Proc. of the IEEE International Symposium on Information Theory, ISIT’15, Hong Kong, Jun. 2015.
  15. B. Vellambi, M. Bloch,  Chou, J. Kliewer, Lossless and Lossy Source Compression with Near-Uniform Output: Is Common Randomness Always Required?, Proc. of the IEEE International Symposium on Information Theory, ISIT’15, Hong Kong, Jun. 2015.
  16. R. Chou, M. Bloch, Polar Coding for the Broadcast Channel with Confidential Messages, Proc. of the IEEE Information Theory Workshop, ITW’15, Jerusalem, Israel, Apr. 2015.
  17. R. Chou, M. Bloch, J. Kliewer, Low-Complexity Channel Resolvability Codes for the Symmetric Multiple-Access Channel, Proc. of the IEEE Information Theory Workshop, ITW’14, Hobart, Tasmania, Nov. 2014.
  18. R. Chou, M. Bloch, Uniform Distributed Source Coding for the Multiple Access Wiretap Channel, Proc. of the IEEE Conference on Communications and Network Security, CNS’14, San Francisco, CA, Oct. 2014.
  19. R. Chou, M. Bloch, Secret-Key Generation with Arbitrarily Varying Eavesdropper's Channel, Proc. of the IEEE Global Conference on Signal and Information Processing, GlobalSIP’13, Austin, TX, Dec. 2013.
  20. R. Chou, M. Bloch, E. Abbe, Polar Coding for Secret-Key Generation, Proc. of the IEEE Information Theory Workshop, ITW’13, Seville, Spain, Sep. 2013.
  21. R. Chou, M. Bloch, Data Compression with Nearly Uniform Output,
    Proc. of the IEEE International Symposium on Information Theory, ISIT’13, Istanbul, Turkey, Jul. 2013.
  22. A. Pierrot, R. Chou, M. Bloch, Experimental Aspects of Secret-Key Generation in Wireless Environments,
    Proc. of the IEEE International Workshop on Signal Processing Advances in Wireless Communications, SPAWC’13, Darmstadt, Germany, Jun. 2013.
  23. R. Chou, M. Bloch, One-Way Rate-Limited Sequential Key-Distillation,
    Proc. of the IEEE International Symposium on Information Theory, ISIT’12, Cambridge, MA, Jul. 2012.
  24. R. Chou, Y. Boers, M. Podt, M. Geist, Performance Evaluation for Particle Filters,
    Proc. of the 14th International Conference on Information Fusion, Fusion’11, Chicago, IL, Jul. 2011.
Additional Information

PhD position available

I have an opening for a fully funded PhD position. If you are interested in joining my research group, please send me your resume with your transcripts, as well as a detailed description of your mathematical background. A minimum requirement is to have taken an advanced probability class and a real analysis class in a mathematics department. Please also provide in your resume contact information for references that could write a recommendation letter for you (preferably mathematics professors). Mathematics students with no engineering background are also encouraged to apply.

Due to the high number of applications I receive, it is for me impossible to reply to all applicants. Please do not feel offended.

Current Students

  • Rumia Sultana (Doctoral Student)
  • Vidhi Rana (Doctoral Student, co-advised with Dr. H. Kwon)
  • Olusola Odeyomi (Doctoral Student, co-advised with Dr. H. Kwon)

Former Students

  • Carson Wang (Undergraduate Student, 2019)
  • Christopher Gravelle (Undergraduate Student, 2019)
  • Antara Chowdhury (Master Student, 2018)
  • Ezekiel Kuenzi (Undergraduate Student, 2018)
  • Christopher Hess (Undergraduate Student, 2018)