Author of the publication

Providing Secrecy With Structured Codes: Tools and Applications to Two-User Gaussian Channels

, and . CoRR, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Real-Time Multi-Stage Architecture for Pose Estimation of Zebrafish Head with Convolutional Neural Networks., , , and . J. Comput. Sci. Technol., 36 (2): 434-444 (2021)The Actual Nature of Light (Ⅰ) Reveal the Mystery about the Actual Nature of Light from Newton, Einstein to the Recent Mistakes., , , , and . J. Quantum Information Science, 1 (2): 54-60 (2011)On the energy-delay trade-off of a two-way relay network., and . CISS, page 865-870. IEEE, (2008)The Gaussian Many-to-1 Interference Channel with Confidential Messages, and . CoRR, (2010)Cooperation with an Untrusted Relay: A Secrecy Perspective, and . CoRR, (2009)Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay, and . CoRR, (2010)Providing Secrecy With Structured Codes: Two-User Gaussian Channels., and . IEEE Trans. Inf. Theory, 60 (4): 2121-2138 (2014)Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay., and . IEEE Trans. Inf. Theory, 59 (1): 177-192 (2013)A coarse-to-fine scene text detection method based on Skeleton-cut detector and Binary-Tree-Search based rectification., , and . Pattern Recognit. Lett., (2018)Open-sector rapid-reactive collision avoidance: Application in aerial robot navigation through outdoor unstructured environments., , , and . Robotics Auton. Syst., (2019)