Author of the publication

Chaos embedded polar coding for wiretap channel in negative secrecy capacity case.

, , and . CISP-BMEI, page 1949-1953. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Analysis of Area and Energy Efficient Reconfigurable Cryptographic Accelerator for Securing IoT Devices., , , , , , , , , and 1 other author(s). Sensors, 22 (23): 9160 (2022)Dynamically Reconfigurable Cache for Low-Power Embedded System., , , and . ICNC (5), page 180-184. IEEE Computer Society, (2007)Fooling Decision-Based Black-Box Automotive Vision Perception Systems in Physical World., , , , , , and . IEEE Trans. Intell. Transp. Syst., 25 (7): 7081-7092 (July 2024)A Blockchain-Based Privacy-Preserving Authentication Scheme for VANETs., , , , and . IEEE Trans. Very Large Scale Integr. Syst., 27 (12): 2792-2801 (2019)A +33dBm 1.9 GHz linear CMOS power amplifier with MOS-level linearizers., , , , , , , and . ISIC, page 544-547. IEEE, (2014)LEAP: A Lightweight Encryption and Authentication Protocol for In-Vehicle Communications., , , , , and . ITSC, page 1158-1164. IEEE, (2019)Fooling the Eyes of Autonomous Vehicles: Robust Physical Adversarial Examples Against Traffic Sign Recognition Systems., , , , , and . NDSS, The Internet Society, (2022)Chaos embedded polar coding for wiretap channel in negative secrecy capacity case., , and . CISP-BMEI, page 1949-1953. IEEE, (2016)Pass and Run: A Privacy Preserving Delay Tolerant Network Communication Protocol for CyberVehicles., , , , and . IEEE Des. Test, 36 (6): 56-62 (2019)Hardware implementation of SHA-3 candidate based on BLAKE-32., , , and . BMEI, page 1317-1320. IEEE, (2012)