Author of the publication

Gaussian wiretap channels with correlated sources: Approaching capacity region within a constant gap.

, , and . ICC Workshops, page 794-799. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The hand shape recognition of Human Computer Interaction with Artificial Neural Network., , , and . VECIMS, page 350-354. IEEE, (2009)Construction of Multivariate Quadratic Quasigroups (MQQs) in arbitrary Galois fields., , and . IAS, page 314-319. IEEE, (2011)Inter-calibration of satellite passive microwave land observations from MWRI and AMSR-E over the bare soil and grassland., , , , , and . IGARSS, page 2032-2035. IEEE, (2016)An Information-Theoretic Approach to the Chipless RFID Tag Identification., , , and . IEEE Access, (2019)A Fresh Look into the Biometric Authentication - Perspective from Shannon's Secrecy System and a Special Wiretap Channel., and . SECRYPT, page 168-177. SciTePress, (2011)Systematic n, n - 2 codes with capability of correcting single- and adjacent transposition errors., and . ITW, page 1-5. IEEE, (2018)Wiretap Channel with Correlated Sources., , and . IC2E, page 472-477. IEEE Computer Society, (2014)Collaborative Technologies and Data Science in Smart City Applications., , and . J. UCS, 25 (8): 865-867 (2019)On the achievable individual-secrecy rate region for broadcast channels with receiver side information., , and . ISIT, page 26-30. IEEE, (2014)Effects of Feedback on the One-sided Secrecy of Two-way Wiretap through Multiple Transmissions., , , and . CoRR, (2017)