Author of the publication

Extractable Common Randomness From Gaussian Trees: Topological and Algebraic Perspectives.

, , , and . IEEE Trans. Information Forensics and Security, 11 (10): 2312-2321 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic proxy-based watermarking for WWW., , , , and . Computer Communications, 24 (2): 144-154 (2001)Locally regularised two-stage learning algorithm for RBF network centre selection., , and . Int. J. Systems Science, 43 (6): 1157-1170 (2012)Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks., , and . Pervasive and Mobile Computing, 2 (2): 159-186 (2006)Real-time pitch tracking based on combined SMDSF., , , and . INTERSPEECH, page 301-304. ISCA, (2005)A spectrum smoothing method for speaker verification., , , and . APSIPA, page 1291-1295. IEEE, (2015)A novel automatic two-stage locally regularized classifier construction method using the extreme learning machine., , , and . Neurocomputing, (2013)Medium Access Control protocols for ad hoc wireless networks: A survey., , and . Ad Hoc Networks, 4 (3): 326-358 (2006)Secure code distribution in dynamically programmable wireless sensor networks., , and . IPSN, page 292-300. ACM, (2006)Time-slotted voting mechanism for fusion data assurance in wireless sensor networks under stealthy attacks., , and . Computer Communications, 33 (13): 1524-1530 (2010)Failure Rate Minimization with Multiple Function Unit Scheduling for Heterogeneous WSNs., , and . GLOBECOM, page 5213-5217. IEEE, (2008)