Author of the publication

Capacity-Equivocation Region Bounds for Degraded Broadcast Channel with Action-Dependent States.

, , , , and . CIT, page 263-269. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tracking the Mobile Jammer Continuously in Time by Using Moving Vector., , , and . ISCID (1), page 43-48. IEEE, (2017)An Efficient Self-Healing Key Distribution with Resistance to the Collusion Attack for Wireless Sensor Networks., and . ICC, page 1-5. IEEE, (2010)Artificial Noise Generated in MIMO Scenario: Optimal Power Design., , , , , and . IEEE Signal Process. Lett., 20 (10): 964-967 (2013)Wiretap Channel with Information Embedding on Actions., and . Entropy, 16 (4): 2105-2130 (2014)Localization of multiple jamming attackers in vehicular ad hoc network., , , , and . Int. J. Distributed Sens. Networks, (2017)Intelligent intrusion detection based on federated learning aided long short-term memory., , , and . Phys. Commun., (2020)Yet Another Traffic Classifier: A Masked Autoencoder Based Traffic Transformer with Multi-Level Flow Representation., , , , , , and . AAAI, page 5420-5427. AAAI Press, (2023)A Semi-Supervised Federated Learning Scheme via Knowledge Distillation for Intrusion Detection., , , , , and . ICC, page 2688-2693. IEEE, (2022)Flow Sequence-Based Anonymity Network Traffic Identification with Residual Graph Convolutional Networks., , , , , , and . IWQoS, page 1-10. IEEE, (2022)Subdomain Protection is Needed: An SPF and DMARC-Based Empirical Measurement Study and Proactive Solution of Email Security., , , , , and . SRDS, page 140-150. IEEE, (2023)