Author of the publication

New bounds of permutation codes under Hamming metric and Kendall's τ -metric.

, , , and . Des. Codes Cryptogr., 85 (3): 533-545 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bounds on the Length of Functional PIR and Batch Codes., , and . IEEE Trans. Inf. Theory, 66 (8): 4917-4934 (2020)A Partially Pre-Trained Dense Network for Image Super-Resolution., , , , , , and . ICSAI, page 1168-1173. IEEE, (2019)Online Learning of Wearable Sensing for Human Activity Recognition., , , , and . IEEE Internet Things J., 9 (23): 24315-24327 (2022)Scattering Properties of an Acoustic Anti-Parity-Time-Symmetric System and Related Fabry-Perot Resonance Mode., , , , and . Symmetry, 14 (5): 965 (2022)Which account will you follow? Recommending influential accounts on social media., , and . Multim. Tools Appl., 82 (22): 34053-34074 (September 2023)A general private information retrieval scheme for MDS coded databases with colluding servers., and . Des. Codes Cryptogr., 87 (11): 2611-2623 (2019)New constructions of MDS symbol-pair codes., , , , and . Des. Codes Cryptogr., 86 (4): 841-859 (2018)Bi-Skip: A Motion Deblurring Network Using Self-paced Learning., , , , and . CoRR, (2019)Snake-in-the-Box Codes for Rank Modulation under Kendall's τ-Metric in S2n+2., and . IEEE Trans. Inf. Theory, 62 (9): 4814-4818 (2016)Rethinking the security of IoT from the perspective of developer customized device-cloud interaction., , and . SAC, page 210-213. ACM, (2022)