Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Rate-Distortion-Leakage Tradeoff for Single-Server Information Retrieval., , , and . IEEE J. Sel. Areas Commun., 40 (3): 832-846 (2022)BP-LED Decoding Algorithm for LDPC Codes Over AWGN Channels., , , and . IEEE Trans. Inf. Theory, 65 (3): 1677-1693 (2019)Stopping Redundancy Hierarchy Beyond the Minimum Distance., , , and . IEEE Trans. Inf. Theory, 65 (6): 3724-3737 (2019)Refined Upper Bounds on Stopping Redundancy of Binary Linear Codes., and . CoRR, (2014)Low complexity algorithm approaching the ML decoding of binary LDPC codes., , , and . ISIT, page 2704-2708. IEEE, (2016)Refined upper bounds on stopping redundancy of binary linear codes., and . ITW, page 1-5. IEEE, (2015)Average spectra for ensembles of LDPC codes and applications., , , and . ISIT, page 361-365. IEEE, (2017)On failing sets of the interval-passing algorithm for compressed sensing., and . Allerton, page 306-311. IEEE, (2016)Generative Adversarial User Privacy in Lossy Single-Server Information Retrieval., , , , and . IEEE Trans. Inf. Forensics Secur., (2022)Straggler-Resilient Differentially-Private Decentralized Learning., , , , and . ITW, page 708-713. IEEE, (2022)