Author of the publication

Consistent Recovery Threshold of Hidden Nearest Neighbor Graphs.

, , , and . IEEE Trans. Inf. Theory, 67 (8): 5211-5229 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of Blockchain System for Protection of Personal Information in Digital Content Trading Environment., , , and . ICOIN, page 152-157. IEEE, (2020)Randomly Elected Blockchain System based on Grouping Verifiers for Efficiency and Security., , , and . ICACT, page 159-165. IEEE, (2020)Cloud Security Issues and Log-based Proactive Strategy., , and . ICACT, page 392-397. IEEE, (2021)Enhanced password processing scheme based on visual cryptography and OCR., , and . ICOIN, page 254-258. IEEE, (2017)Authorization based on mobile whitelist in devices for device-to-device communications., , , and . ICOIN, page 706-711. IEEE, (2018)Optimal query complexity for private sequential learning against eavesdropping., , and . AISTATS, volume 130 of Proceedings of Machine Learning Research, page 2296-2304. PMLR, (2021)Is It Easier to Count Communities Than Find Them?, , , and . ITCS, volume 251 of LIPIcs, page 94:1-94:23. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2023)Consistent Recovery Threshold of Hidden Nearest Neighbor Graphs., , , and . IEEE Trans. Inf. Theory, 67 (8): 5211-5229 (2021)Estimating the Coefficients of a Mixture of Two Linear Regressions by Expectation Maximization., , and . IEEE Trans. Inf. Theory, 65 (6): 3515-3524 (2019)Consistent recovery threshold of hidden nearest neighbor graphs., , , and . COLT, volume 125 of Proceedings of Machine Learning Research, page 1540-1553. PMLR, (2020)