Author of the publication

An alternate construction of an access-optimal regenerating code with optimal sub-packetization level.

, , and . NCC, page 1-6. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Secure Network Coding for Multiple Unicast Traffic., , and . IEEE Trans. Inf. Theory, 66 (8): 5204-5227 (2020)A distortion based approach for protecting inferences., , , and . ISIT, page 1913-1917. IEEE, (2017)Distortion-Based Lightweight Security for Cyber-Physical Systems., , , , and . IEEE Trans. Autom. Control., 66 (4): 1588-1601 (2021)Codes with hierarchical locality., , and . ISIT, page 1257-1261. IEEE, (2015)On Secure Capacity of Multiple Unicast Traffic over Separable Networks., , and . ITW, page 1-5. IEEE, (2019)An alternate construction of an access-optimal regenerating code with optimal sub-packetization level., , and . NCC, page 1-6. IEEE, (2015)An Approach for In-House USB2.0 Electrical Compliance Testing on Nanoscale SoC., , , , and . MTV, page 95-99. IEEE Computer Society, (2013)A high-rate MSR code with polynomial sub-packetization level., , and . ISIT, page 2051-2055. IEEE, (2015)On Information Theoretic and Distortion-based Security.. University of California, Los Angeles, USA, (2019)base-search.net (ftcdlib:qt7qs7z91g).Distorting an Adversary's View in Cyber-Physical Systems., , , , and . CDC, page 1476-1481. IEEE, (2018)