Author of the publication

Artificial-Noise-Aided Message Authentication Codes with Information-Theoretic Security.

, , , and . CoRR, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Ling, Cong
add a person with the name Ling, Cong
 

Other publications of authors with the same name

Secrecy gain of trellis codes: The other side of the union bound., , and . ITW, page 70-74. IEEE, (2011)Application of the Improved FOCUSS for Arrival Time Estimation (IFATE) algorithm to WLAN high accuracy positioning services., , , and . UPINLBS, page 1-8. IEEE, (2012)Deterministic compressed-sensing matrices: Where Toeplitz meets Golay., , and . ICASSP, page 3748-3751. IEEE, (2011)Performance evaluation for band-limited DS-CDMA systems based on simplified improved Gaussian approximation., and . IEEE Trans. Communications, 51 (7): 1204-1213 (2003)Chaotic frequency hopping sequences., and . IEEE Trans. Communications, 46 (11): 1433-1437 (1998)Updated Basis Lattice Reduction Based Sequential User Selection for Multiuser MIMO Systems., , , and . GLOBECOM, page 1-5. IEEE, (2010)Design and Optimization of Scheduling and Non-Orthogonal Multiple Access Algorithms With Imperfect Channel State Information., , , , and . IEEE Trans. Vehicular Technology, 67 (11): 10800-10814 (2018)Near-Optimal Relaying Strategy for Cooperative Broadcast Channels., , and . ICC, page 1-5. IEEE, (2009)Improved Upper Bounds for Approximate Lattice Decoding With Dual-Basis Reduction.. ICC, page 1181-1184. IEEE, (2008)Differential lattice decoding in noncoherent MIMO., , , and . ICC, page 752-756. IEEE, (2005)