Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reliability and Secrecy Functions of the Wiretap Channel Under Cost Constraint., , and . IEEE Trans. Inf. Theory, 60 (11): 6819-6843 (2014)Error and Secrecy Exponents for Wiretap Channels under Two-Fold Cost Constraints., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 99-A (12): 2136-2146 (2016)Numerical Study on Secrecy Capacity and Code Length Dependence of the Performances in Optical Wiretap Channels., , , and . CoRR, (2015)Reliability and Security Functions of the Wiretap Channel under Cost Constraint., , and . CoRR, (2013)MR Manual and Authoring Tool with Afterimages., , and . AINA, page 890-895. IEEE Computer Society, (2015)Wiretap Channels With One-Time State Information: Strong Secrecy., , and . IEEE Trans. Inf. Forensics Secur., 13 (1): 224-236 (2018)Short-span seeking control of hard disk drive based on integral type learning PTC., and . AMC, page 554-559. IEEE, (2010)Influence of the Unit Number of Intermediate Layers and Networks on Learning Ability., , and . J. Robotics Mechatronics, 2 (2): 118-122 (1990)Case Study on Applicability of Artificial Intelligence for IT Service Project Managers with Multi Value Systems in the Digital Transformation Era., and . AHFE (8), volume 1208 of Advances in Intelligent Systems and Computing, page 278-288. Springer, (2020)Autonomous Community Area Construction Technology to Achieve High Assurance., , , , and . ICDCS Workshops, page 57. IEEE Computer Society, (2007)