From post

Characterization of super-additivity and discontinuity behavior of the capacity of arbitrarily varying channels under list decoding.

, , и . ISIT, стр. 2820-2824. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Artificial Noise-Aided Physical Layer Security in Underlay Cognitive Massive MIMO Systems with Pilot Contamination., , и . Entropy, 19 (7): 349 (2017)The Deterministic and Correlated Random Public-Confidential Capacity Regions of the Arbitrarily Varying Wiretap Channel., , и . WIFS, стр. 1-7. IEEE, (2018)Real Number Signal Processing can Detect Denial-of-Service Attacks., , и . ICASSP, стр. 4765-4769. IEEE, (2021)Secure Joint Communication and Sensing., , , и . ISIT, стр. 844-849. IEEE, (2022)Capacity of Finite State Channels with Feedback: Algorithmic and Optimization Theoretic Properties., , , и . ISIT, стр. 498-503. IEEE, (2022)A Reverse Jensen Inequality Result with Application to Mutual Information Estimation., , , и . ITW, стр. 1-6. IEEE, (2021)Secure Lossy Function Computation with Multiple Private Remote Source Observations., , и . WSA, стр. 1-6. VDE Berlag / IEEE, (2021)Randomized Nested Polar Subcode Constructions for Privacy, Secrecy, and Storage., , , , и . ISITA, стр. 475-479. IEEE, (2020)Multiple Noisy Private Remote Source Observations for Secure Function Computation., , и . ACSCC, стр. 690-697. IEEE, (2021)Stealthy keyless secret key generation from degraded sources., , , и . ACSSC, стр. 14-18. IEEE, (2017)