Author of the publication

Secret Key-Enabled Authenticated-Capacity Region, Part - II: Typical-Authentication.

, , , and . IEEE Trans. Inf. Theory, 68 (11): 6981-7004 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Federated Learning with Flexible Control., , , and . CoRR, (2022)Congestion-aware Distributed Task Offloading in Wireless Multi-hop Networks Using Graph Neural Networks., , , and . CoRR, (2023)Cryptographic Side-Channel Signaling and Authentication via Fingerprint Embedding., , , and . IEEE Trans. Inf. Forensics Secur., 13 (9): 2216-2225 (2018)Secret Key-Enabled Authenticated-Capacity Region, Part - II: Typical-Authentication., , , and . IEEE Trans. Inf. Theory, 68 (11): 6981-7004 (2022)Federated Learning with Flexible Control., , , and . INFOCOM, page 1-10. IEEE, (2023)Learning to Transmit with Provable Guarantees in Wireless Federated Learning., , , and . CoRR, (2023)Inner Bound for the Capacity Region of Noisy Channels with an Authentication Requirement., , , and . ISIT, page 126-130. IEEE, (2018)Secret key authentication capacity region, Part I: average authentication rate., , , and . CoRR, (2020)Enabling Machine Learning on Resource-constrained Tactical Networks., , , , and . MILCOM, page 932-937. IEEE, (2022)Characterizing the Performance of Distributed Edge Processing Resource Allocation in Dynamic Networked Environments., , , , , and . MILCOM, page 888-893. IEEE, (2023)