Author of the publication

Secret-Sharing LDPC Codes for the BPSK-Constrained Gaussian Wiretap Channel.

, , and . IEEE Trans. Inf. Forensics Secur., 6 (3-1): 551-564 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collaborative jamming mitigation on block-fading channels., , and . ICC, page 483-487. IEEE, (2005)Bit-interleaved rectangular parity-check coded modulation with iterative demodulation in a two-node distributed array., , and . ICC, page 2812-2816. IEEE, (2003)Reliability-based hybrid ARQ and rate-compatible punctured convolutional (RCPC) codes., and . WCNC, page 2105-2109. IEEE, (2004)Airborne traffic surveillance systems: video surveillance of highway traffic., , , , and . VSSN@MM, page 131-135. ACM, (2004)Adaptive nonuniform phase-shift-key modulation for multimedia traffic in wireless networks., and . IEEE J. Sel. Areas Commun., 18 (8): 1394-1407 (2000)Cooperative-diversity slotted ALOHA., , and . Wirel. Networks, 13 (3): 361-369 (2007)Formation reconfiguration for mobile robots with network connectivity constraints., , , and . IEEE Netw., 26 (4): 18-24 (2012)Performance analysis for collaborative decoding with least-reliable-bits exchange on AWGN channels., , and . IEEE Trans. Commun., 56 (1): 58-69 (2008)Information flow based connectivity maintenance of a multi-agent system during formation control., , , and . CDC/ECC, page 2375-2380. IEEE, (2011)Graph Matching-Based Formation Reconfiguration of Networked Agents With Connectivity Maintenance., , , , and . IEEE Trans. Control. Netw. Syst., 2 (1): 24-35 (2015)