Author of the publication

Artificial-Noise-Aided Message Authentication Codes with Information-Theoretic Security.

, , , and . CoRR, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Membership based on combining cluster center with affinity in FSVR and its application in soft sensor modeling., , and . ICMLC, page 571-575. IEEE, (2010)Adaptive Spectrum Selection for Cognitive Radio Networks., , and . CSSE (5), page 67-72. IEEE Computer Society, (2008)978-0-7695-3336-0.Emergency planning: Small airport scheduling in disaster relief., , and . ICNSC, page 289-294. IEEE, (2012)Energy-Efficient Power Control Game for Cognitive Radio Systems., and . SNPD (1), page 526-530. IEEE Computer Society, (2007)BUPT at TREC 2006: Spam Track., , , , and . TREC, Special Publication 500-272, National Institute of Standards and Technology (NIST), (2006)BJUT at TREC 2014 Contextual Suggestion Track: Hybrid Recommendation Based on Open-web Information., , , , and . TREC, Special Publication 500-308, National Institute of Standards and Technology (NIST), (2014)Image inpainting algorithm based on TV model and evolutionary algorithm., , , and . Soft Comput., 20 (3): 885-893 (2016)Dictionary design in subspace model for speaker identification., , and . I. J. Speech Technology, 18 (2): 177-186 (2015)An Efficient Data Aggregation Protocol Concentrated on Data Integrity in Wireless Sensor Networks., , , and . IJDSN, (2013)CMP cache performance projection: accessibility vs. capacity., , , , and . SIGARCH Computer Architecture News, 35 (1): 13-20 (2007)