Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Numerical capacity analysis of time varying fading channels using finite state Markov models., , and . ISIT, page 180. IEEE, (2004)Age of Information in Downlink Systems: Broadcast or Unicast Transmission?, , , and . IEEE J. Sel. Areas Commun., 41 (7): 2057-2070 (July 2023)Low Influence, Utility, and Independence in Differential Privacy: A Curious Case of (3 2)., , , and . IEEE J. Sel. Areas Inf. Theory, 2 (1): 240-252 (2021)On Converse Results for Secure Index Coding., , , , and . ITW, page 1-6. IEEE, (2021)Update-based Maximum Column Distance Coding Scheme for Index Coding Problem., , and . ISIT, page 575-580. IEEE, (2021)$\alpha$-Information-theoretic Privacy Watchdog and Optimal Privatization Scheme., , and . ISIT, page 2584-2589. IEEE, (2021)Age of Information in Downlink Systems: Broadcast or Distributed Transmission?, , , and . CoRR, (2022)Attaining Fairness in Communication for Omniscience., , , and . Entropy, 24 (1): 109 (2022)Capacity Theorems for Distributed Index Coding., , , and . IEEE Trans. Inf. Theory, 66 (8): 4653-4680 (2020)Network-Controlled Physical-Layer Security: Enhancing Secrecy through Friendly Jamming., , , , and . ISCC, page 1-7. IEEE, (2022)