Author of the publication

Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels

, , and . CoRR, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels., , and . IEEE J. Sel. Areas Commun., 30 (9): 1666-1674 (2012)Control of photo sharing over Online Social Networks., , , , and . GLOBECOM, page 704-709. IEEE, (2014)Joint UFH and power control for effective wireless anti-jamming communication., , and . INFOCOM, page 738-746. IEEE, (2012)Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels, , and . CoRR, (2011)Privacy-Preserving Machine Learning Algorithms for Big Data Systems., , , , and . ICDCS, page 318-327. IEEE Computer Society, (2015)My Privacy My Decision: Control of Photo Sharing on Online Social Networks., , , , and . IEEE Trans. Dependable Secur. Comput., 14 (2): 199-210 (2017)A Secure Collaborative Machine Learning Framework Based on Data Locality., , , and . GLOBECOM, page 1-5. IEEE, (2015)Adversarial Discrete Sequence Generation without Explicit NeuralNetworks as Discriminators., , , , , and . AISTATS, volume 89 of Proceedings of Machine Learning Research, page 3089-3098. PMLR, (2019)Wireless key establishment with asynchronous clocks., , and . MILCOM, page 1410-1415. IEEE, (2011)Reinforcement Learning with Token-level Feedback for Controllable Text Generation., , , , , and . CoRR, (2024)