Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sub-Function Superposition for Computation Over NOMA., , and . ICC Workshops, page 1-6. IEEE, (2019)Computation over Wide-Band MAC: Improved Achievable Rate through Sub-Function Allocation., , , , , and . CoRR, (2018)Reliability and Latency Analysis of Sliding Network Coding With Re-Transmission., , , and . WCNC, page 1-6. IEEE, (2023)Reversible storage of entangled two-mode wavepacket based on electromagnetically induced transparency., , and . Quantum Inf. Process., 17 (9): 224 (2018)Sub-Function Allocation for Computation over Wide-Band MAC., , and . WCNC, page 1-6. IEEE, (2019)NOMA-Enhanced Computation Over Multi-Access Channels., , , , , and . IEEE Trans. Wirel. Commun., 19 (4): 2252-2267 (2020)Exploring the Limits of ChatGPT in Software Security Applications., , , , , , and . CoRR, (2023)Computation Over Wide-Band Multi-Access Channels: Achievable Rates Through Sub-Function Allocation., , , , , and . IEEE Trans. Wirel. Commun., 18 (7): 3713-3725 (2019)Computation Over NOMA: Improved Achievable Rate Through Sub-Function Superposition., , , , , and . CoRR, (2018)A New Era in LLM Security: Exploring Security Concerns in Real-World LLM-based Systems., , , , and . CoRR, (2024)