From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Inducing information stability and applications thereof to obtaining information theoretic necessary conditions directly from operational requirements., и . CoRR, (2018)Keyless authentication in the presence of a simultaneously transmitting adversary., , и . ITW, стр. 201-205. IEEE, (2016)Detection of channel degradation attack by Intermediary Node in Linear Networks., и . INFOCOM, стр. 747-755. IEEE, (2012)Off-Policy Actor-Critic with Emphatic Weightings., , , и . J. Mach. Learn. Res., (2023)Secret Key-Enabled Authenticated-Capacity Region, Part - II: Typical-Authentication., , , и . IEEE Trans. Inf. Theory, 68 (11): 6981-7004 (2022)Importance Sampling Placement in Off-Policy Temporal-Difference Methods., и . CoRR, (2022)Estimating Traffic Rates in CSMA/CA Networks: A Feasibility Analysis for a Class of Eavesdroppers., , , и . IEEE Trans. Wirel. Commun., 22 (12): 9793-9807 (декабря 2023)Inner Bound for the Capacity Region of Noisy Channels with an Authentication Requirement., , , и . ISIT, стр. 126-130. IEEE, (2018)Inducing Information Stability to Obtain Information Theoretic Necessary Requirements., и . IEEE Trans. Inf. Theory, 66 (2): 835-864 (2020)Information integrity in lossy source coding with side information., и . Allerton, стр. 1267-1271. IEEE, (2014)