Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identity Authentication over Noisy Channels., , , , and . Entropy, 17 (7): 4940-4958 (2015)An IoT-Based Wearable Labor Progress Monitoring System for Remote Evaluation of Admission Time to Hospital., , , , , and . IEEE J. Biomed. Health Informatics, 27 (6): 3037-3048 (June 2023)Processing Delays Do Not Degrade Network Error-Correction Capacity in Directed Networks., , , and . IEEE Commun. Lett., 19 (12): 2054-2057 (2015)Robustness of deep learning models on graphs: A survey., , , , , and . AI Open, (2021)Overhead-free in-place recovery and repair schemes of XOR-based regenerating codes., , and . ISIT, page 854-858. IEEE, (2015)Interactive code to correct and detect omniscient Byzantine adversaries., , , and . ITW, page 45-49. IEEE, (2014)Overhead-Free In-Place Recovery Scheme for XOR-Based Storage Codes., , and . TrustCom, page 552-557. IEEE Computer Society, (2014)Size of 1-Error-Detecting Codes in Three Interactive Transmissions., , , and . VTC Spring, page 1-4. IEEE, (2015)Message Authentication over Noisy Channels., , , , and . Entropy, 17 (1): 368-383 (2015)A design of Intelligent Public Trash Can based on Machine Vision and Auxiliary Sensors., , , , and . J. Robotics Netw. Artif. Life, 8 (4): 273-277 (2022)