From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security for control systems under sensor and actuator attacks., , и . CDC, стр. 3412-3417. IEEE, (2012)Design and Analysis of Stability-Guaranteed PUFs., , , и . CoRR, (2017)An LP Characterization of the Secret-message Capacity of Three Erasure Networks With Feedback., , , и . IEEE Trans. Inf. Theory, 62 (5): 2430-2480 (2016)Group testing for overlapping communities., , , , и . CoRR, (2020)Diversity Embedding in Multiple Antenna Communications., , и . Advances in Network Information Theory, том 66 из DIMACS Series in Discrete Mathematics and Theoretical Computer Science, стр. 285-301. DIMACS/AMS, (2003)Wireless network secrecy with public feedback., , и . Allerton, стр. 753-760. IEEE, (2008)On Byzantine-Resilient High-Dimensional Stochastic Gradient Descent., и . ISIT, стр. 2628-2633. IEEE, (2020)Optimality and approximate optimality of source-channel separation in networks., , , и . ISIT, стр. 495-499. IEEE, (2010)Multistage successive refinement for Wyner-Ziv source coding with degraded side informations., и . ISIT, стр. 1594-1598. IEEE, (2006)A Deterministic Model for Wreless Relay Networks an its Capacity., , и . ITW, стр. 1-6. IEEE, (2007)