Rémi Chou

Assistant Professor in Computer Science in the CSE department at UTA.

Articles
  1. R. Chou and M. R. Bloch, “Multiuser Commitment over Noisy Channels,” IEEE Transactions on Information Theory, vol. 71, no. 11, pp. 1557–9654, Nov. 2025.
  2. R. A. Chou, M. Bloch, and A. Yener, “Universal Covertness for Discrete Memoryless Sources,” ieee_j_it, vol. 67, no. 8, pp. 1557–9654, Aug. 2021.
  3. R. A. Chou, M. R. Bloch, and J. Kliewer, “Empirical and Strong Coordination via Soft Covering with Polar Codes,” ieee_j_it, vol. 64, no. 7, pp. 5087–5100, Jul. 2018.
  4. R. A. Chou, B. N. Vellambi, M. R. Bloch, and J. Kliewer, “Coding Schemes for Achieving Strong Secrecy at Negligible Cost,” ieee_j_it, vol. 63, no. 3, pp. 1858–1873, Mar. 2017.
  5. R. A. Chou and M. R. Bloch, “Polar Coding for the Broadcast Channel with Confidential Messages: A Random Binning Analogy,” ieee_j_it, vol. 62, no. 5, pp. 2410–2429, May 2016.
  6. R. A. Chou, M. R. Bloch, and E. Abbe, “Polar Coding for Secret-Key Generation,” ieee_j_it, vol. 61, no. 11, pp. 6213–6237, Nov. 2015.
  7. R. A. Chou and M. R. Bloch, “Separation of Reliability and Secrecy in Rate-Limited Secret Key-Distillation,” ieee_j_it, vol. 60, no. 8, pp. 4941–4957, Aug. 2014.
Conference proceedings
  1. R. A. Chou and M. R. Bloch, “Retractable Commitment,” in ieee_itw, Saint-Malo, France, Apr. 2023, pp. 260–265.
  2. R. Chou and M. R. Bloch, “Commitment over Multiple-Access Channels,” in Proc. of 58th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sep. 2022.
  3. R. A. Chou, M. R. Bloch, and A. Yener, “Universal covertness for Discrete Memoryless Sources,” in 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, Aug. 2016, pp. 516–523.
  4. R. A. Chou and M. R. Bloch, “Using deterministic decisions for low-entropy bits in the encoding and decoding of polar codes,” in Proc. of 53rd Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sep. 2015, pp. 1380–1385.
  5. B. N. Vellambi, M. R. Bloch, R. A. Chou, and J. Kliewer, “Lossless and Lossy Source Compression with Near-Uniform Outputs: Is Common Randomness Always Required?,” in ieee_isit, Hong Kong, Jun. 2015, pp. 2171–2175.
  6. R. A. Chou, M. R. Bloch, and J. Kliewer, “Polar Coding for Empirical and Strong Coordination via Distribution Approximation,” in ieee_isit, Hong Kong, Jun. 2015, pp. 1512–1516.
  7. R. A. Chou and M. R. Bloch, “Polar Coding for the Broadcast Channel with Confidential Messages,” in ieee_itw, Jerusalem, Israel, Apr. 2015, pp. 1–5.
  8. R. A. Chou, M. R. Bloch, and J. Kliewer, “Low-Complexity Channel Resolvability Codes for the Symmetric Multiple-Access Channel,” in ieee_itw, Hobart, Tasmania, Nov. 2014, pp. 466–470.
  9. R. A. Chou and M. R. Bloch, “Uniform Distributed Source Coding for the Multiple Access Wiretap Channel,” in Proc. of IEEE Conference on Communications and Network Security, San Francisco, CA, Oct. 2014, pp. 127–132.
  10. R. A. Chou and M. R. Bloch, “Secret-Key Generation with Arbitrarily Varying Eavesdropper’s Channel,” in Proc. of Global Conference on Signal and Information Processing, Austin, TX, Sep. 2013, pp. 277–280.
  11. R. A. Chou and M. R. Bloch, “Data compression with nearly uniform ouput,” in ieee_isit, Istanbul, Turkey, Jul. 2013, pp. 1979–1983.
  12. R. A. Chou, M. R. Bloch, and E. Abbe, “Polar Coding for Secret-Key Generation,” in ieee_itw, Sevilla, Spain, Apr. 2013, pp. 1–5.
  13. A. J. Pierrot, R. A. Chou, and M. R. Bloch, “Experimental Aspects of Secret-Key Generation in Indoor Wireless Environments,” in Proc. of Signal IEEE 4th Workshop on Signal Processing Advances in Wireless Communications, Apr. 2013.
  14. R. A. Chou and M. R. Bloch, “One-way rate-limited sequential key-distillation,” in ieee_isit, Cambridge, MA, Jul. 2012, pp. 1777–1781.