Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two-Stage Biometric Identification Systems Without Privacy Leakage., , , and . IEEE J. Sel. Areas Inf. Theory, 2 (1): 223-239 (2021)Operational Equivalence of Distributed Hypothesis Testing and Identification Systems., , and . ISIT, page 1999-2003. IEEE, (2019)Fundamental Limits for Biometric Identification Systems without Privacy Leakage., , , and . Allerton, page 1105-1112. IEEE, (2019)Entropy-regularized Optimal Transport Generative Models., , , and . ICASSP, page 3532-3536. IEEE, (2019)Neural Network based Explicit Mixture Models and Expectation-maximization based Learning., , , and . IJCNN, page 1-10. IEEE, (2020)Hypothesis Testing and Identification Systems., , and . IEEE Trans. Inf. Theory, 67 (6): 3765-3780 (2021)General Rank Multiuser Downlink Beamforming With Shaping Constraints Using Real-Valued OSTBC., , , and . IEEE Trans. Signal Process., 63 (21): 5758-5771 (2015)Perspectives on Identification Systems.. Royal Institute of Technology, Stockholm, Sweden, (2019)base-search.net (ftkthstockholm:oai:DiVA.org:kth-254611).Efficient label propagation for classification on information networks., , and . SoICT, page 41-46. ACM, (2012)Hierarchical Identification With Pre-Processing., , and . IEEE Trans. Inf. Theory, 66 (1): 82-113 (2020)