Group Testing With Probabilistic Tests: Theory, Design and Application, Proc. 47th Allerton Conf. on Commun., Control and Computing, 2009. ,
DOI : 10.1109/TIT.2011.2148691
URL : http://arxiv.org/abs/1009.3186
Boolean Compressed Sensing and Noisy Group Testing, IEEE Transactions on Information Theory, vol.58, issue.3, 2009. ,
DOI : 10.1109/TIT.2011.2178156
URL : http://arxiv.org/abs/0907.1061
Note on noisy group testing: Asymptotic bounds and belief propagation reconstruction, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2010. ,
DOI : 10.1109/ALLERTON.2010.5707018
URL : http://arxiv.org/abs/1010.2441
Universal fingerprinting: Capacity and random-coding exponents, 2008 IEEE International Symposium on Information Theory, pp.220-224, 2008. ,
DOI : 10.1109/ISIT.2008.4594980
URL : http://arxiv.org/abs/0801.3837
Optimal probabilistic fingerprint codes, Proc. 35th ACM Symposium on Theory of Computing, pp.116-125, 2003. ,
DOI : 10.1145/1346330.1346335
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.8.8911
Estimating the Minimal Length of Tardos Code, Proc. 11th Information Hiding Workshop, pp.176-190, 2009. ,
DOI : 10.1007/s10623-007-9142-x
URL : https://hal.archives-ouvertes.fr/inria-00505882
Worst case attacks against binary probabilistic traitor tracing codes, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS), pp.46-50, 2009. ,
DOI : 10.1109/WIFS.2009.5386484
URL : https://hal.archives-ouvertes.fr/inria-00505893