Author of the publication

Equating the achievable exponent region to the achievable entropy region by partitioning the source.

, and . ISIT, page 1346-1350. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secret Key-Enabled Authenticated-Capacity Region, Part - II: Typical-Authentication., , , and . IEEE Trans. Inf. Theory, 68 (11): 6981-7004 (2022)Keyless authentication in the presence of a simultaneously transmitting adversary., , and . ITW, page 201-205. IEEE, (2016)Detection of channel degradation attack by Intermediary Node in Linear Networks., and . INFOCOM, page 747-755. IEEE, (2012)Off-Policy Actor-Critic with Emphatic Weightings., , , and . J. Mach. Learn. Res., (2023)Value-aware Importance Weighting for Off-policy Reinforcement Learning., , and . CoLLAs, volume 232 of Proceedings of Machine Learning Research, page 745-763. PMLR, (2023)An Off-policy Policy Gradient Theorem Using Emphatic Weightings., , and . NeurIPS, page 96-106. (2018)Messages per secret bit when authentication and a min-entropy secrecy criterion are required., , and . CISS, page 1-6. IEEE, (2017)Certification codes for maliciousness detection in Physical-layer Network Coding., , , and . MILCOM, page 1-6. IEEE, (2012)Transmitting Arbitrary Sources with Finite Error Over a Broadcast Channel with Confidential Communications., and . ISIT, page 921-925. IEEE, (2018)Minimax Bounds for Blind Network Inference., , , and . ISIT, page 1823-1828. IEEE, (2021)